News & Highlights Archive
News & Highlights
(Source: Fairfaxtimes) After officially launching its signature platform in April 2016, the security softwarecompany announced on Feb. 8 that a record year of growth between 2016 and 2017 had enabled
Read More
News & Highlights
(Source: Windows Report) Such powerful systems, also need powerful security software to keep them safe. This is why we chose five of the best security tools that are appropriate for your Alienware machine,
Read More
News & Highlights
(Source: Digital Journal) Pune, India — (SBWIRE) — 03/02/2018 — Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also
Read More
News & Highlights
(Source: PR Newswire) TokenEx was founded by two Qualified Security Assessors (QSAs) as a Cloud Data Protection Platform, providing tokenization, encryption, and data vaulting as a unified Software as a Service for all
Read More
News & Highlights
(Source: SecurityInformed) However, smaller companies allow smaller manufacturers to leverage the company’s size and superior hardware products for superior hybrid hardware/software products at lower costs. Additionally, smaller companies with flatter
Read More
News & Highlights
(Source: IoT Evolution World) Both new eSIM solutions feature high grade end-to-end security from hardware-to-software, in order to offer safe, tamper-resistant data protection for consumers, Original Equipment Manufacturers (OEMs), MNOs and
Read More
News & Highlights
(Source: WNYC) Amazon really wants to come over to your house. Or at least make it to the front door. The Seattle-based tech giant announced Tuesday it’s made another
Read More
News & Highlights
(Source: Sify News) The platform also features Qualcomm Processor Security, which is the hardware and software security foundation for billions of Internet of Things (IoT) devices deployed around the world. The
Read More
News & Highlights
(Source: SlashGear) Independent security researcher @SecurityLab just published a table showing how smartphone companies fared in providing their users much-needed timely securityupdates. And the results … Having control over both software and hardware and
Read More
News & Highlights
(Source: Ars Technica) However, it is likely software based, according to Dan Guido, CEO of the securityfirm Trail of Bits. Guido told Ars that he had heard Cellebrite’s attack method may be
Read More