According to a May 2015 global survey of IT decision makers (ITDMs), wireless networks are a significant source of risk…
Browsing: CISO
In light of the news that Israeli-based security researchers have devised a way to steal encryption keys stored on a PC…
Leader in advanced threat protection uncovers the cybercriminal ecosystem supporting the recent rise of malicious macros, providing new insight on…
Oberthur Technologies (OT), a world leader in digital security solutions for the mobility space, scored number 1 position for innovation…
Intro Cytegic DyTA intelligence platform gathers, processes and analyses hundreds of thousands of intelligence feeds on a month basis, to…
Veracode’s 2015 State of Software Security Report benchmarks risk profile for 34 industries across seven vertical markets Veracode, a leader…
A Ruby gem is a standard packaging format used for Ruby libraries and applications. This packaging format allows Ruby software…
Researchers have found a vulnerability in the energy grid with Nova-Wind Turbine human-machine (HMI) interface, which would allow remote code…
Intel Security Technologies to be included in Honeywell’s Industrial Cyber Security Solutions for Process Control Honeywell (NYSE:HON) Process Solutions (HPS)…
The number and variety of devices getting connected to the internet are increasing everyday. Leading analyst estimates indicate that over…