Cyber Security
How to thwart POS hackers
In the present climate it is unusual that a day goes by without a cyber security story hitting the headlines. Data hacking, digital terrorism and cyber security breaches have become commonplace in our ever-more connected world.
App protects your digital legacy after you pass away
The password manager and secure digital vault, Keeper Security, has announced its new Emergency Access feature which will allow up to five trusted family members or friends entrance into a customer’s secure digital vault to access important files, passwords and documents in the case of an emergency or tragic event. Emergency Access can be set up to protect Keeper customers’ digital legacies in the event they become incapacitated,...
Network appliance for network security and virtualisation
The Lanner NCA-6210, a 2U x86 rackmount network appliance built with the Intel Xeon Scalable processor platform and C621/C627 chipset, features powerful networking processing capability, higher throughput for virtualisation applications, up to 640GB DDR4 2666MHz REG DIMM and the support for 1.5x memory bandwidth as previous generation Intel Xeon processor based server platforms.
How do you get a robot to recognise a surprise?
How do you get a robot to recognise a surprise? That's a question Artificial Intelligence (AI) researchers are pondering, especially as AI begins to change space research. A new article in the journal Science: Robotics offers an overview of how AI has been used to make discoveries on space missions.
Miniaturising computer chips of drones
In recent years, engineers have worked to shrink drone technology, building flying prototypes that are the size of a bumblebee and loaded with even tinier sensors and cameras. Thus far, they have managed to miniaturise almost every part of a drone, except for the brains of the entire operation — the computer chip.
Duo provide safe, trusted, and easy-to-use IoT devices
STMicroelectronics and Security Platform, a Korea-based technology innovator enabling trusted connectivity for the Internet of Things (IoT), are bringing robust, efficient, and easy-to-use security solutions to IoT devices. The IoT comprises potentially billions of tiny, connected, embedded computing devices to help manage services and infrastructure automatically.
Belden introduces 'Industrial Cyber Security for Dummies'
Belden, a global leader in signal transmission solutions for mission-critical applications, has published a special edition of Industrial Cyber Security for Dummies. The book, which was written by David Meltzer and Jeff Lund, is a Belden/Tripwire Special Edition. It can be downloaded free of charge in .pdf format – and is also available in a regular print edition.
Are you at risk of being hacked without even knowing it?
Research from consumer security firm BullGuard has shown that, with an ever-increasing amount of connected devices in our everyday lives from fitness trackers, smart TVs and even children's toys, millions of people are seriously at risk of being hacked.
TÜV SÜD appointed Certified Body for Cyber Essentials programme
It has been revealed that TÜV SÜD United Kingdom has achieved Certified Body status for the UK Government’s Cyber Essentials programme, which is designed to protect organisations from cyber security threats. Organisations certified by TÜV SÜD can promote that their IT systems comply with a Government-endorsed standard, demonstrating that they are protecting their own and their customers’ data by having a robust and...
Industrial control needs greater cyber security
The need to improve cyber security in industrial control systems is at the forefront of a report published by accreditation body CREST, claiming that a lack of standards-based technical security testing is putting industrial control environments and critical national infrastructure at risk.