Search Results

Search results for: cybersecurity

Mexico City deploys over 13,000 surveillance cameras in four months

Eagle Eye Networks, a provider of cloud video surveillance, announced today one of the fastest completions of a large scale, fully integrated city-wide surveillance program, installing 13,720 cameras in 4 months. This project has been a large success for Mexico City C5, contributing to Mexico City’s larger “Citizen Safety” mobile application. This mobile application facilitates content sharing for more effective neighborhood watch and a panic SOS button.

(more…)

Read more

May 14, 2020

Posted by: Anasia D'mello

Saving us from demented smart things

The Good, the Bad and the Ugly of IoT security regulations

From smart cars to smart factories, the Internet of Things (IoT) is transforming every aspect of modern life. Deployment of smart, connected devices delivers many benefits, says Steve Hanna, senior principal, Infineon Technologies, but also brings a very real threat of cyberattacks that can harm innocent users. (more…)

Read more

April 27, 2020

Posted by: Anasia D'mello

No quick fix for healthcare security

From test results and lab equipment to monitoring equipment and patient records, the healthcare industry is increasingly reliant on digital solutions. (more…)

Read more

April 24, 2020

Posted by: Anasia D'mello

Reducing mobile technology’s security risks to improve patient care

It’s hard, if not impossible, to think of a time when more attention has been paid to healthcare, says Stefan Spendrup, VP of enterprise mobility northern and western europe at SOTI. (more…)

Read more

April 22, 2020

Posted by: Anasia D'mello

IEC 62443: How to achieve the highest levels of industrial security

With the emergence of industry 4.0 and the ever-increasing adoption of the Industrial Internet of Things (IIoT), says Steve Hanna, co-chair of TCG’s Embedded Systems Work Groupthe Industrial Automation and Control Systems industry faces some exciting opportunities ahead. (more…)

Read more

April 16, 2020

Posted by: Anasia D'mello

Optiv hires Deloitte Stalwart Kevin Lynch as chief executive officer

Optiv Security, a security solutions integrator delivering end-to-end cybersecurity solutions, announced that it has named Kevin Lynch as the company’s chief executive officer (CEO) and member of the board of directors, Lynch comes to Optiv from Deloitte, where he served in a variety of leadership roles for more than two decades. (more…)

Read more

April 14, 2020

Posted by: Anasia D'mello

Accenture acquires Revolutionary Security

Accenture has acquired Revolutionary Security, a privately held company specialising in enterprise cybersecurity for information technology (IT) and operational technology (OT) environments. Financial terms were not disclosed. (more…)

Read more

April 8, 2020

Posted by: Anasia D'mello

Napatech significantly improves application performance in virtualised servers

Napatech, a provider of reconfigurable computing platforms, announced the release of its Link-Virtualisation software for its family of SmartNICs. The software solution extends Napatech’s position as the global vendor for FPGA-based SmartNICs, with the highest performance and most feature-rich virtual switching solution for programmable SmartNICs based on FPGAs. The solution delivers a massive increase in network performance and simultaneous reduction in server CPU utilisation, allowing data centre operators to fulfill their vision for software defined networking (SDN) and network functions virtualisation (NFV). (more…)

Read more

April 1, 2020

Posted by: Anasia D'mello

Will 2020 be the year home IoT cyber attacks get serious?

When it comes to disruptive change, the emergence of the smart home is driving demographic, economic, and technological advancement as never before, says David P. Maher, executive VP and chief technology officer of Intertrust. (more…)

Read more

Posted by: Anasia D'mello

Securing the IoT edge means cyber security experts must work together

The Internet of Things (IoT) presents a unique cybersecurity challenge. A combination of low computational power, a wide variety of communication protocols, and a lack of security standards leaves a myriad of channels open for hackers. (more…)

Read more

March 26, 2020

Posted by: Anasia D'mello