Airbiquity, a provider in connected vehicle services, announced the latest release of OTAmatic. This version boasts new features and integrations that address many of today’s top concerns for automakers and suppliers, such as compromise-resilient security, edge data analytics, and more efficient OTA management capabilities.
SafeRide Technologies, the automotive cybersecurity company to offer a multi-layer deterministic and heuristic anomaly detection and threat prevention solution, has collaborated with Ixia, a Keysight Business, to test SafeRide’s vSentry vehicle cybersecurity solution using the BreakingPoint applications and network security test platform.
There’s been a rash of regulation around the world as governments seek to address IoT security. It’s a positive step, indicating the market is maturing but regulating the IoT space is not without its challenges.
Thoma Bravo, a private equity investment firm, has agreed to acquire Veracode, an application security testing (AST) provider, from Broadcom Inc. for $950 million (€832 million) in cash.
The security industry is facing a huge problem and one which, until recently, looked intractable. There are just not enough cyber security operatives in the world’s Security Operations Centres (SOCs)
Kx, a division of First Derivatives plc, announced that it has been selected to provide advanced analytics capabilities within Survalent Technology’s flagship Advanced Distribution Management System (ADMS) platform, SurvalentONE.
One of the biggest discussions as new technologies are evolving is the issue of cybersecurity. In a world where everyone is interconnected and mobile applications practically run our everyday lives, how do you keep users protected from hackers?
ForeScout Technologies, Inc., an Internet of Things (IoT) security company, has teamed up with Belden, a global provider of industrial networking and cybersecurity systems, to help organisations mitigate detrimental impacts to safety,
Security never seems to get any easier, does it? Ransomware, say the experts, shows no signs of diminishing as a threat to consumers and enterprises. So if they can’t nullify the threat, how can enterprises and consumers reduce their vulnerability? Security specialists advise Jeremy Cowan on the next steps to take.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.