More about Cyber Security (32)

| ExoKrypt is a platform for secure digital identity, using biometrics & specialized hardware making security understandable, easy to use for...

| While many companies are cleaning up their client databases to comply with the new General Data Protection Regulation a.k.a. GDPR, other com...

| Gone are the days of tech companies focusing solely on their core product offerings. Today, chip makers are working on artificial intelligen...

| If you thought it was bad enough checking for spam and malicious emails incoming from terrestrial origins some astrophysicists have been mus...

| When a piece of hardware is insecure and may become a potential target for malware attacks, things become complicated. When a vulnerability...

| For years, I managed to keep an old Opel Corsa alive because the most sophisticated electronics parts inside were probably its light bulbs (...

| Arm this week announced the final slate of keynotes and technical sessions for Arm TechCon 2017. This year’s program will focus on how the t...

| The increasingly sophisticated use of automation (with machinery, industrial processes, chemical industry, power generation / distribution a...

| Modern cars are packed from front to back with 'clever' chips; the software that is stored in them provides a large part of the functionalit...

| The cyberattack that hit the world on Friday May 12th is a stark reminder that governments need to rethink cybersecurity policies. The chaos...