16.1 C
New Delhi, India
Monday, November 18, 2024

Tag: cyber security

Four ways the cloud improves your cyber security posture

Adoption of the cloud is not slowing down. In fact, what’s happening is quite the opposite. According to IDC, worldwide spending on cloud computing...

Four ways the cloud improves your cyber security posture

Adoption of the cloud is not slowing down. In fact, what’s happening is quite the opposite. According to IDC, worldwide spending on cloud computing...

Who is Responsible for IoT Security?

By now, you’ve probably heard the conversation about the importance of the Internet of Things (IoT) security over and over again. The increased interconnectivity...

Telco wins 4 million dollar cyber security contract

Telco Systems, a leading provider of innovative SDN/NFV, CE 2.0, MPLS and IP solutions, has been awarded a significant follow-on contract to supply a...

HID collaborates on cyber security for financial sector

HID Global has signed a collaboration agreement with Threatmark, a threat and fraud detection technology company, to develop new capabilities that will enhance the...

Honeywell survey highlights low adoption of industrial cyber security measures

Honeywell through its latest study has reported that industrial companies are not moving quickly to adopt cyber security measures to protect their data and...

Cyber security myths and how they are damaging your business

There has been a significant shift in the methodology used by cyber criminals over the past couple of years, in particular. Whilst traditional ‘hacking’...

Gartner reveals the grim reality of implementing cyber security

You can’t protect everything equally…we have to find a way to control only what matters,” said Earl Perkins, Research Vice President in the Internet...

Cyber security vulnerability check-list advice on best practices

Farpointe Data has just posted the first radio frequency identification(RFID) Cybersecurity Vulnerability Checklist for access control manufacturers, distributors, integrators and end users to use...

4 easy cyber practices to protect end users

It should come as no surprise that, considering the progression of enhanced quality and enriched intelligence provided, video surveillance is one of the most...