TowerSec has the system to address automotive cyber security threats and is running projects with automakers and suppliers that integrate its ECUSHIELD software technology into vehicles. A just-released Wired article by Andy Greenberg ...
Tags: automobile manufacture, TowerSec, auto parts, auto system, vehcile safety
President Barack Obama signed into law H.R. 4007, the Protecting and Securing Chemical Facilities from Terrorist Attacks Act of 2014. The law reauthorizes the Department of Homeland Security’s (DHS) Chemical Facility Anti-Terrorism ...
Tags: tiering methodology, Construction
HID Global has released its projections for trends that will have the greatest impact on the secure identity industry in 2014. The predictions encompass a diverse range of solutions and technologies, including anticipated advances in ...
Tags: HID Global, secure identity
Kaspersky Lab has revealed research results that show an increase in malware in the Middle East. The data, provided by Kaspersky Security Network, reveals that The UAE had the highest rate of attacks in the region, suffering 34% of all ...
Tags: Computer Products, Kaspersky, software
Infosys, the second largest software firm in India, has reached a $34m (£21m) settlement with US authorities in a lawsuit surrounding its alleged misuse of temporary visas. The case, brought by the US Department of State, ...
Tags: Computer Products, software
The chief of US spy organisation, the National Security Agency (NSA), Keith Alexander, believes that the US government needs to speed up the process of getting cyber security legislation in place in order to defend the US from attacks. ...
Tags: Computer Products, software
The government's "digital by default" agenda should be accompanied by one of "security by default" if public sector organisations are to truly protect themselves against cyber security threats and avoid a cyber security skills crisis. ...
Tags: Computer Products
The web porn filter praised by David Cameron recently is operated by Huawei, the Chinese telecommunications firm that politicians in the UK and US have voiced concerns about. According to the BBC, UK-based employees of Huawei have the ...
Chinese telecoms hardware maker Huawei says that its profits for the first half of the year were up 10 per cent, after posting its operating interim results for 2013. It follows an increase in revenue of almost 11 per cent over the same ...
Tags: Huawei, telecoms hardware
The government is to review Huawei's Cyber Security Evaluation Centre (the Cell) and will report its findings later in the year. The Chinese telecommunications firm, which has flourished on a global scale in recent years, has been ...
Tags: Computer Products, huawei
Enterprises are under heavy pressure to change their approach to IT security because of a "nexus of forces" that include big data, social networking, mobile and cloud computing, according to Gartner. Ray Wagner, managing vice president of ...
Tags: Computer Products, software
The £650m over four years that the government allocated to cyber security in 2010 was recently branded "embarrassing" by Bob Ayres, a former intelligence officer at the US Department of Defense, in an interview with Computing, and ...
Tags: Computer Products, software
Cyber criminals are increasingly targeting small businesses due to their less sophisticated defences, according to a new report from Symantec. Companies with 250 employees or less absorbed 18 percent of targeted cyber attacks in 2011, but ...
Tags: Computer Products, software
Indian outsourcing and services company Infosys has teamed up with Queen's University Belfast to conduct joint research into the global cyber security threat. The partnership brings together Queen's University Belfast's Centre for Secure ...
Tags: Computer Products, Computer
iOS continues to lead in the enterprise space as the mobile platform of choice, according to cloud computing vendor, Citrix. In its latest Citrix Enterprise Mobility Cloud report, it claimed that iOS made up 58 percent of all global ...
Tags: iOS, mobile platform, cloud computing