SafeRide Technologies, the automotive cybersecurity company to offer a multi-layer deterministic and heuristic anomaly detection and threat prevention solution, has collaborated with Ixia, a Keysight Business, to test SafeRide’s vSentry vehicle cybersecurity solution using the BreakingPoint applications and network security test platform.
In recent years the telecoms industry has scrutinised, debated, forecast and developed a huge variety of IoT use cases, as well as outlining the benefits they promise business, industry and society, and the opportunities for monetisation they present to a sector undergoing radical digitalisation.
The Internet of Things (IoT) is creating opportunities for businesses across every industry. However, the big question for the C-suite is how do they ensure their business is taking full advantage?
Allot Communications Ltd., a global provider of network intelligence and security solutions for service providers worldwide, has released findings from its Telco Security Trends Report. This reveals a dynamic and automated threat landscape in which consumers lack the security expertise to effectively protect themselves.
DDoS attacks can cost enterprises $50,000 (€40,419.43) per attack – but lost revenue is still only considered to be the fourth most damaging consequence of this type of cyber-attack, according to research published by Corero Network Security a provider of real-time DDoS defense solutions.
China Unicom has partnered with Huawei to deploy Huawei’s AntiDDoS8000 products on backbone network nodes across China. This constitutes the largest anti-DDoS system on China Unicom’s network and provides comprehensive anti-DDoS protection capabilities for their customers.
As IoT botnet attacks continue to grow in size and effectiveness in 2018, the damage they cause will force the IoT manufacturing industry to add stronger security to their products or eventually result in governments addressing IoT security with regulation, according to researchers at WatchGuard Technologies.
Imperva, Inc. committed to protecting business-critical data and applications in the cloud and on-premises, announced a significant expansion of its network and investment in second-generation DDoS attack mitigation technology.
Service providers, hosting providers and digital enterprises are all impacted by DDoS attacks. But besides the headline-grabbing volumetric attacks, another more sinister DDoS method lies in the shadows.
We saw the 1st reason of supply chain cybersecurity in the Part 1 yesterday. Now we see the remaining reasons today. In today’s world, “common criminals, organised crime rings, and nation-states leverage sophisticated techniques to launch attacks that are highly targeted and very difficult to detect,”
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.