Search Results

Results for "cyberattack"

Video Game Industry Faced Highest Growth in Cyberattacks during Pandemic

Press Release Akamai, (NASDAQ: AKAM), the world’s most trusted solution for protecting and delivering digital experiences, today released research showing that cyberattack traffic targeting the video game industry grew more than any other industry during the...

Genus Power and NanoLock Security Partner to Secure Smart Meters and Prevent Utility Cyberattacks and Fraud

Press Release NanoLock’s device-level solution brings cyber protection and management to India’s largest smart metering infrastructure provider, Genus Power and its customers, to protect utilities and smart city customers against cyberattacks, while...

Global Businesses Hit by Cyberattacks and Challenges to Scaling Endpoint Security during COVID-19, finds Asavie Global CXO Study into Future of the Office Anywhere

Press Release Asavie, a leader in secure Enterprise Mobility and IoT services, today announced the findings from a recently conducted Global CXO Study: The Future of the Secure Office Anywhere. In one of the most extensive global surveys of its kind thus far, the...

Telecom Endpoint Security Market is growing because of increasing cyberattacks, rising malware, and spam ware attacks.

Press Release Endpoint security is a technique of protecting the corporate network when accessed via remote devices such as laptops, smart phones, tablets, remote devices or other wireless devices. Each device with a remote connecting to network enables entry point...

I’m gonna get myself connected…

STARTUP STORIES Startup DEVITY say their KEYNOA Engine enables you to automatically establish an encrypted connection of any IoT device to any data platform. Tell us about your start up DEVITY is your expert for IT security and cloud connectivity in large scale...

Stay safe – think like an attacker

We meet bugshell, the Berlin based startup who are building a community to make penetration tests more efficient, transparent, and accessible. Penetration tests examine an organization’s cyber security under the viewpoint of an attacker.

  • Filter

  • Date Range