-
Quisque at mi felis. Nunc id tempor sem. Cras rutrum magna ac pulvinar rutrum.
-
Hillstone Networks, a leading provider of Enterprise Network Security and Risk Management solutions, has been included in Gartner’s Magic Quadrant for Network Firewalls. To us, this recognition is a testament to the innovation in technology and market penetration with Hillstone’s solution portfolio.
-
689Cloud PTE Ltd., the innovative leader in secure file sharing, announced today that it has entered into an agreement with Ricoh Co., Ltd. of Tokyo, Japan to provide secure document sharing technology for use in Ricoh’s new “RICOH Doc Trace” service. RICOH Doc Trace is a new service from Ricoh that will allow users to easily send and track business documents on the cloud. The service will be available initially in North America and Japan later this month. 689Cloud is exhibiting at the Cloud and Cyber Security Expo in Singapore on October 9-10, 2019 at booth G80.
-
Has your company embarked on a process of digitalization? The combination of cloud technology and digital security is the key to realizing digital transformation. It’s not just about using modern technology, it’s also about the legally compliant use of data, which can be of great value to businesses.
-
Uniscon GmbH, expert for cloud applications and solutions that ensure secure and legally compliant data traffic, celebrates its tenth anniversary. The company belongs to the TÜV SÜD Group since 2017 and is part of their digitization strategy. Uniscon's solutions are used to exchange sensitive data by organizations, such as those in the finance, insurance, healthcare and industry sectors.
-
A £183m fine was not what the directors of British Airways (BA) had been expecting. Owing to the GDPR, data breaches can end up being quite expensive— something the UK airline is now discovering for itself1 . And this figure doesn’t even quantify the loss of image! You may recall that in 2018 details of about 500,000 customers had been harvested by hackers. Now, almost a year later, BA is being forced to pay up—and the data theft is costing it a pretty penny! Companies that use the services of Indian tech service provider Wipro and thus violate their data protection obligations are also facing severe penalties2 . Since 2017, the IT supplier has increasingly been the target of cybercriminals, who home in on Wipro’s customers, among them Internet providers, insurance companies, and energy utilities. What is the common denominator in these two cases? Weaknesses in the supply chain—a risk that many suppliers and companies underestimate. But how to avoid them?
-
Comprehensive study of 100 business decision makers in Singapore reveals the role corporate culture and employee education play in successful cybersecurity practices
-
Horangi Warden is designed to help companies using AWS services to detect vulnerabilities and recommend security best practices in order to strengthen their cybersecurity capabilities in the Cloud. On ...
-
The Tenable Cyber Exposure platform is the industry’s first solution to holistically assess, manage and measure cyber risk across the modern attack surface.
-
New York, NY (July 30, 2019) – AppViewX, an emerging leader in the automation and orchestration of network infrastructure for large enterprises, today announced it has secured $30 million in growth funding from Brighton Park Capital (“BPC”).
-
Utimaco, a leading manufacturer of Hardware Security Module (HSM) technology, received the Common Criteria (CC) EAL4+ certification for its CryptoServer CP5 HSM based on the eIDAS Protection Profile EN 419 221-5. CryptoServer CP5 is the first HSM in the market with a CC certification based on this protection profile, making it a future-proof choice for eIDAS trust services. These include local and remote electronic signing and sealing, issuing of certificates, website authentication and timestamping. For application development and regression testing, Utimaco offers a dedicated CryptoServer CP5 HSM simulator to prospects and customers.
-
Currently, most IoT devices use RSA and ECC to protect confidentiality, integrity and authenticity for device identities and communication. Experts from the security community, including Dr. Brian LaMacchia from Microsoft Research, predict that large-scale quantum computers capable of breaking RSA and ECC public key cryptography will exist within the next 10 to 15 years. Although this might seem like a long time away, many devices such as connected cars, smart homes, connected cities, connected medical devices and other critical infrastructures will either live longer than this or will take longer to update.