cyber attack
Top Wireless Gotchas! Number Three: Mitigating security risks
Blog — This is the third post in a multi-part series of blogs by Bill Zujewski, which specifically explores the challenges of dealing with wireless technology as part of an M2M (Machine-To-Machine) initiative. The series offers insights to help designers and developers prepare for and overcome the unique challenges involved with implementation. Today’s post focuses
Read moreIBM to acquire Q1 Labs and build security intelligence
Armonk, New York, USA: IBM (NYSE: IBM) has agreed to acquire privately held Q1 Labs, a Waltham, Massachusetts-based provider of security intelligence software. The move aims to accelerate IBM’s efforts to secure its clients’ enterprises more intelligently by applying analytics
Read more