Written by Ronald Sens, Director, EMEA Marketing at A10 Networks There’s a flood of connected devices making their way into our homes and businesses. From...
Written by Cameron Camp, security researcher at ESET Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging...
Oliver Horn, Senior Solutions Architect – Alliances at Red Hat shares his views about IoT representing the beginning of a new era of networked systems...
New research from global cybersecurity firm ESET reveals that the recent hype surrounding artificial intelligence (AI) and machine learning (ML) is deceiving three in four...
Written by Nour Kassassir is the vice president and business technology services director of Parsons’ Middle East and Africa region Artificial Intelligence uses machine learning...
Written by Tomas Foltyn, security writer at ESET The attack, called “Thermanator”, could use your body heat against you in order to steal your credentials...
Written by Vincent Gourmelen, ID Card Solutions Product Manager, Citizen Identity Solutions at HID Global At a time of strong data encryption, on-chip biometry checks, digital...
Written by Sanjay Vaid, Practice Director of Cyber Risk Security at Wipro Limited Security is undoubtedly a primary focus for any organization, particularly in this digital...