IoT gateway for secure Edge to Cloud connectivity

Review Display Systems has introduced a Standard IoT Gateway System from leading manufacturer of advanced industrial and embedded computing platforms, AAEON. The SRG-TG01 Gateway features 11th generation Intel Core i7, i5, i3 and Celeron SoC processors and enables the connection…

Veritas introduces Veritas Alta for Cloud data management

Veritas Alta allows customers to accelerate their transition to the Cloud without sacrificing control over data protection, application resiliency, or data compliance. Veritas Technologies, a leader in multi-Cloud data management, has advanced its Autonomous Data Management strategy with the launch…

Atlas VPN reports: 41% of business cyberattacks are through Cloud servers

Recent changes in IT infrastructure, such as companies’ transition to Cloud solutions – all of which which have been triggered by the rise in remote work – have shifted the focus of cyberattacks. Atlas VPN discusses. According to the data…

How to securely connect IoT devices to cloud applications and manage them throughout their lifetimes

Sensors, actuators and other IoT devices communicate with applications running on computer servers over IoT networks. These servers may be on-premises or in the cloud and there are a growing number of attacks on them where the IoT devices themselves…

Department for Education boosts cyber training courses in security revamp

The Department for Education (DfE) overhauled its security investment in the most recent financial year (FY 20-21), by increasing security courses on offer to staff from four to 44. Additionally, course participants surged from just under 7,000 in FY 19-20,…

ETSI releases specifications boosting trustful end-to-end network and service automation

ETSI has announced the release of three major specifications and report developed by its Zero-touch network and Service Management (ZSM) group. ETSI GS ZSM 003, defines end-to-end network slicing management and orchestration architecture blueprint and solutions, and ETSI GS ZSM 009-1 specifies the…

Group report on encrypted traffic integration released to protect users from attacks

ETSI’s Industry Specification Group on Encrypted Traffic Integration (ISG ETI) has concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks. In the group’s first report, ETSI GR ETI 001, entitled Encrypted Traffic Integration…

‘Bad bots’ make up nearly two-fifths of all internet traffic

A new report from Barracuda networks has revealed that automated traffic takes up nearly two-thirds of internet traffic (64%) – and whilst just 25% of automated traffic was made up by good bots, such as search engine crawlers and social network bots,…

GCHQ launch programme to solve national security challenges

GCHQ, the UK’s intelligence and cyber agency, is looking for five ambitious businesses to join its pioneering innovation programme to apply trailblazing technologies to national security challenges. The GCHQ Innovation Co-Lab, developed in partnership with HOST, the Home of Skills &…

Politicians under cyber attack: preventing attacks and leaks of confidential information

Various organisations, firms and offices, are being broken into more frequently than before through digital identity theft. Politicians have been affected as well. Leaks of important and confidential data from email accounts or inappropriately secured applications are more and more…