The hub sends user data when it communicates with a server, including the login credentials needed to sign in into the web interface of the smart hub
Read MoreCompanies struggle with quickly and accurately detecting security incidents
Read MoreThey could also be targeting wearable like Fitbits and smartwatches, and even home appliances, like your fridge or washing machine
Read MoreChange in regulatory frameworks for ATM encryption, BFSI and insurance sector have lately been causing significant uptick in the security encryption adoption in the country. Due to this, Rahul Kumar, Country Manager & Director, WinMagic India, says that customers have started seeing them as very serious specialist players who can solve the pain areas in encryption business. Rahul Kumar, in conversation with Sarabjeet Kaur. Excerpts:
Read MoreThe Charter delineates 10 action areas in cybersecurity where governments and businesses must both become active
Read MoreA vast majority identified business interruption as the cyber loss scenario with the greatest potential to impact their organization
Read MoreThreatQ will also fully integrate into NTT Security’s Global Managed Security Services Platform
Read MoreMicrosoft’s reluctance to fix the issue suggests that this is a flaw in the architecture or design of the software
Read More