Home Cybersecurity

Cybersecurity

On each category you can set a Category template style, a Top post style (grids) and a module type for article listing. Also each top post style (grids) have 5 different look style. You can mix them to create a beautiful and unique category page.

Internet of Things (IoT) security – a big concern

With the Internet of Things (IoT) gaining a lot of traction and more connected devices have been included in almost every aspect of life,...

SDN, SD-WAN, and multi-cloud in 2018

Wan Dynamics has released a report talking about connecting the cloud in 2018 and how SDN, SD-WAN, and the multi-cloud solutions have changed the...
video

Bringing Trust to the Internet of Things by Red Alert Labs

Red Alert Labs has published a video talking about finding the right balance between IoT security needs and IoT business needs, covering three major...

British Airways breach leaks 380k card payments

British Airways has announced that it has been a victim of a hacker attack that has revealed the personal and financial details of its...
video

A modern approach to Industrial Cybersecurity by Schneider Electric

Schneider Electric, a company that is focused on the digital transformation of energy management and automation in homes, buildings, data centers, and industries, has...
video

Five common vulnerabilities in Industrial Control Systems (ICS)

Lanner America has released a video detailing five most common vulnerabilities in Industrial Control Systems (ICS) as well as the importance of a robust...

AT&T sued for $224 million over the major security breach

AT&T is getting sued for security negligence in a US $224 million lawsuit filed earlier this month, which was the result of a major...

Intrusion Detection Systems (IDS), protecting the network

Intrusion detection systems, most commonly referred to as the IDS, is either a device or software application designed to monitor the network for malicious...

Cloud Security – Bringing scalable and efficient security

Cloud security, sometimes also known as the cloud computing security, is a set of services and/or technologies deployed both by cloud providers and cloud...

Embedded Devices need Security

The explosion of the Internet of Things and smart embedded devices connected to IP creates the need for a complete new security approach to...
- Advertisement -

LATEST NEWS

MUST READ