Cybersecurity
One third of execs would pay hacker’s ransom demands instead of investing in security, report reveals
One third of global business decision makers report that their organisation would try to cut costs by considering paying a ransom demand from a hacker rather than invest in information … Continued
Automotive cybersecurity for connected cars
While addressing cybersecurity threats has become common practice for consumer devices such as personal computers and smart phones, cybersecurity for connected vehicles with rapidly evolving technologies and more complex attack … Continued
The security challenge posed by the Internet of Things: Part 2
In part one of this series, we outlined the three tiers of the IoT security architecture and three key security challenges IoT devices pose. Now we will move on to … Continued