Cybercriminals have seven-day advantage to weaponise vulnerabilities, according to new research from Tenable

Tenable®, Inc., the Cyber Exposure company, released a new research report that quantifies the window of opportunity cybercriminals have to weaponise vulnerabilities. The research found that cybercriminals have a median seven-day window of opportunity during which they can exploit a vulnerability to attack their victims,

Read more

Zilliqa releases the first sharding blockchain

Zilliqa, a new blockchain platform based on the technology of sharding that solves the scalability issue faced by current blockchain platforms like Bitcoin and Ethereum, has announced the release of their public testnet. It marks a technological milestone as the first ever implementation of sharding used in a public,

Read more

IoT security: Catch up to the threat and become unassailable

This World IoT Day (celebrated around the globe on Monday 9th April), I am particularly excited to see quite how far we have come with the Internet of Things. The IoT market is projected to grow from an installed base of 15 billion devices in 2015 to 30 billion devices in 2020 and 75 billion in

Read more

Rajant experts push the need to streamline seaport security and connectivity at container terminal automation conference 2018

Rajant Corporation, the provider of Kinetic Mesh networks, will push its mission-critical connectivity capabilities to control moving port assets and drive autonomous applications from standing still at the Container Terminal Automation Conference 2018 this week.

Read more

Life Lessons: Matthew Owen, managing director, M2M Intelligence

Matthew Owen, managing director, M2M Intelligence, says leave room in negotiation to avoid a prospect’s loss of face.

Read more

A ‘common security model’ against typical hazards in the IoT

Up to now, individuals have generally been using a dedicated computer for work; now, however, the Internet of Things (IoT), with billions of networked devices that are for the most part not monitored by humans, presents enormous inherent security risks.

Read more