Search
Close this search box.

Education

A good cybersecurity program is focused on threat detection, incident response and vulnerability management. Courtesy: Chris Vavra, CFE Media and Technology

Smart manufacturing needs smart security, communication

Cybersecurity attacks against manufacturing have increased in the last several years and will continue to do. While a majority have a financial motive rather than corporate espionage, the result is the same: It costs a […]

Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

While the mergers and acquisitions (M&A) and capital raise markets have a wary eye on numerous potential macroeconomic headwinds — the Ukrainian war, inflation, the great resignation — the cybersecurity market continues to demonstrate its […]

Courtesy: Brett Sayles

Technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security […]

Courtesy of: Louisiana State University

Taking a ‘hands-on’ approach to smartphone identity verification

As smartphones have grown more sophisticated over the years, so have their accompanying security measures for identity verification. Simple passwords have been replaced by thumbprints and facial recognition. However, those methods do not solve the […]

A good cybersecurity program is focused on threat detection, incident response and vulnerability management. Courtesy: Chris Vavra, CFE Media and Technology

Smart manufacturing needs smart security, communication

Cybersecurity attacks against manufacturing have increased in the last several years and will continue to do. While a majority have a financial motive rather than corporate espionage, the result is the same: It costs a […]

Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

While the mergers and acquisitions (M&A) and capital raise markets have a wary eye on numerous potential macroeconomic headwinds — the Ukrainian war, inflation, the great resignation — the cybersecurity market continues to demonstrate its […]

Courtesy: Brett Sayles

Technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security […]

Courtesy of: Louisiana State University

Taking a ‘hands-on’ approach to smartphone identity verification

As smartphones have grown more sophisticated over the years, so have their accompanying security measures for identity verification. Simple passwords have been replaced by thumbprints and facial recognition. However, those methods do not solve the […]

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES