Robotics
Prototype Nation: The Chinese Cybercriminal Underground in 2015
By the end of 2013, the Chinese cybercrime underground was a very busy economy, with…
Canalys announces winners of APAC Channel Partner of the Year awards
Partners honoured at the APAC Canalys Channels Forum, the region’s largest independent channel conference Canalys…
CyberArk Launches New Industry Initiative to Promote CISO Cyber Security Expertise
Panel of Global 1000 CISOs Share Advice for Implementing Strategic Security Programs, Gaining Stakeholder Support…
Visibility and control over SSL traffic in an era of HTTP/2.0
F5 Networks “SSL Everywhere” architecture is centered on the custom-written SSL/TLS stack that is part…
Secure messaging apps to become everyday payment transaction platforms
A growing trend away from consumer apps to secure messaging apps is about to get…
Securing operational technology: big data’s big role
Convergence between operational technology (OT), the hardware and software that monitors and controls devices or…
Practitioners Give Global Cybersecurity a “C” According to New Research from Tenable Network Security
International survey of information security professionals identifies cloud, mobile devices and board-level involvement as common…
Dell Takes Endpoint Security to a New Level with Cylance Advanced Threat Protection Technology
Dell to incorporate Cylance technology into its Dell Data Protection endpoint security solution New Dell…
Four considerations to make sense of today’s business technology
Today’s business landscape is crowded with emerging enterprise technology, which presents new opportunities and questions.…
Blackberry releases key enhancements to enterprise software platform
Expanded capabilities offer greater security, productivity and collaboration across iOS, Android and BlackBerry 10 and…
Sonardyne’s Sentinel sonar extends capabilities of Fortem’s Omnipresence 3D security management software
Maritime security company, Sonardyne International Ltd, has announced that its market leading Sentinel Intruder Detection…
Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft
According to a study from IDC and Flexera Software, a significant proportion of software companies…
Akamai Launches Cloud Networking to Accelerate and Secure Cloud-based Applications for Enterprise Branch Offices
New Services Designed to Address Performance, Connectivity, and Security Challenges of Hybrid WAN and Direct…
Protected Health Information shows up in 90 percent of sectors, not just healthcare
Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data…