Press Releases

Utimaco hardware security modules achieve payment card industry compliance

Utimaco has achieved Payment Card Industry PIN Transaction Security Hardware Security Module Version 2 (PCI PTS HSM V2) compliance for uncontrolled environments for its CryptoServer CSe HSM platform from the PCI Standards Security Council, (more…)

Read more

July 26, 2017

Posted by: Avadhoot Patil

Designing wireless IoT applications for the emerging new networks – LTE and NB-IoT

As always, the telecoms industry is looking forward to the next generation of technology. We are already seeing the first-mover companies starting to build IoT solutions for the LTE and NB-IoT networks, says Colin Newman CEO of Antenova Ltd. (more…)

Read more

Posted by: Avadhoot Patil

Senet and New Boundary Technologies collaborate to provide rapid time to market for IoT applications

Senet, a provider of global connectivity and network management for the Internet of Things, and New Boundary Technologies, a IoT application service provider, announced a partnership to integrate New Boundary Technologies’ RemoteAware™ Enterprise IoT application service with Senet’s standards-based IoT network. (more…)

Read more

July 25, 2017

Posted by: Avadhoot Patil

Five ways remote access will impact working practices – Part 2

Part 1 of this article appeared yesterday. Trends like the Internet of Things, 24/7 business cultures, and evolving technologies mean that the way that we work is changing rapidly, and businesses are increasingly sharing resources and collaborating in order to get ahead. (more…)

Read more

Posted by: Avadhoot Patil

Five ways remote access will impact working practices – Part 1

Trends like the Internet of Things, 24/7 business cultures, and evolving technologies mean that the way that we work is changing rapidly, and businesses are increasingly sharing resources and collaborating in order to get ahead. Some are unaware of the role remote access plays within these developments, when it often acts as the backbone. (more…)

Read more

July 24, 2017

Posted by: Avadhoot Patil

What is the current state of mobile security? Part 2

If you’re like most people, your phone is by your side throughout your day. Thanks to payment apps, mobile GPS and mobile banking, our phones now double as a wallet, map, bank and so much more. (more…)

Read more

July 21, 2017

Posted by: Avadhoot Patil

What is the current state of mobile security? Part 1

If you’re like most people, your phone is by your side throughout your day. Thanks to payment apps, mobile GPS and mobile banking, our phones now double as a wallet, map, bank and so much more. (more…)

Read more

July 20, 2017

Posted by: Avadhoot Patil

If an attack is successfully monetised, expect similar attacks to follow: Some preventive security steps

Adversaries are constantly evolving. Success breeds copy-cats. And security is multifaceted. These are some of the key lessons Jeremy Cowan takes away from talking to Ted Harrington, executive partner, Independent Security Evaluators. (more…)

Read more

July 19, 2017

Posted by: Avadhoot Patil

Balancing risk with IoT benefits: How industrial plants can be secured against hacking

The British media widely reported how the recent WannaCry cyber attack largely targeted NHS trusts across the country. However, what was not as widely reported was that the attack also affected many factories across the world, shutting down production and causing concerns about data security. (more…)

Read more

July 18, 2017

Posted by: Avadhoot Patil

Four ways to reinforce your SME against cyber threats

Despite its name, the small and medium-sized enterprise (SME) sector is colossal in terms of size and revenue, says Sneha Paul, product consultant at ManageEngine. (more…)

Read more

July 17, 2017

Posted by: Avadhoot Patil