Tag "Hardware Security"

Back to homepage
Hardware/Network

Create secure IoT products: Enable security by design

Good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime have been introduced in a report by ENISA. Click here

Hardware/Network

Cyber Risk Increases at All Layers of the Corporate Network

The growing popularity of cloud and DevOps environments will continue to drive business agility while exposing organizations, from enterprises to manufacturers, to third-party risk. Click here to view original webpage at www.helpnetsecurity.com

Vendor News

Intel flexes AI processing muscle

Cloud and datacenter architects searching for new ways to pack more artificial intelligence horsepower into already constrained spaces will want to take a close look at Intel’s new Nervana Neural

Hardware/Network

Cybersecurity is Key to a Successful 5G Strategy

The worldwide excitement around 5G is on the verge of hitting a crescendo with phased trials and roll-outs happening all across. Global networks and forums are abuzz with talks around how dynamically

Cloud Hardware/Network

Goodbye bloat: How and why the WAN is shifting to the cloud

The cloud-based model is taking over seemingly everything these days. Everything from firewalls to deter hackers to malware that helps them is offered in the “as a Service” model (no

Industry Insights

When cyberwar struck its first civilian target

Andy Greenberg’s book Sandworm is trenchant on the mounting capacity of malware to wreak havoc. Brian Nussbaum reviews.Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers Andy

Software

Most organizations plan to increase their cybersecurity budgets in 2020

With the perpetually shifting threat landscape, most organizations (over 90%) believe that the cyber threat landscape will stay the same or worsen in 2020, according to FireEye. FireEye surveyed over 800 CISOs

Mobile

Microsoft Intune can now block unauthorized BYOD hardware

Microsoft has integrated third-party mobile threat defense (MTD) software with its Intune unified endpoint management (UEM) platform, enabling corporate systems to detect when an employee’s unenrolled, smartphone or tablet has an app

Hardware/Network

New Data Analysis Approach could Strengthen the Security of IoT Devices

A multi-pronged data analysis approach that can strengthen the security of IoT devices, such as smart TVs, home video cameras and baby monitors, against current risks and threats has been created

Hardware/Network

Consumers Concerned About Connected Home Privacy, Still Few Implement Safety Practices

In order to understand what people are doing to protect themselves from the risk of compromised smart home devices, such as internet-connected TVs, smart thermostats, home assistants and more, ESET polled 4,000 consumers.