Information Security

The three technologies that are likely to determine the next decade are 5G, AI and biometrics. (Image source: Vishnu Vijayan/Pixabay)

Dmitry Samartsev, CEO of BI. ZONE and William Dixon, head of operations, centre for cybersecurity, World Economic Forum have analysed the popular technologies and evaluated the cyber risks of tomorrow as the development of digital fraud is largely due to rapid technological progress

Additional capacity designed, pre-engineered, tested and installed live 28 weeks after contract finalised. (Image source: Schneider Electric)

Green Mountain AS and Schneider Electric announced that the three-megawatt data centre capacity at the DC2-Telemark site has gone live in readiness for customer occupation

The UAE impersonation attacks have increased by 75 per cent. (Image source: DataCorp Technology LTD/Flickr)

Email and data security company Mimecast has published its third-year ?State of Email Security? report, which reveals a significant increase in targeted attacks such as phishing, data leaks, impersonation and business disrupting ransomware

Siemens strengthens network against hacker attacks. (Image source: Christiaan Colen/Flickr)

Siemens has established binding cybersecurity requirements, primarily for suppliers of security-critical components such as software, processors and electronic components for certain types of control units

The project will be used in financial settlements between Saudi Arabia and the UAE through blockchains and distributed ledgers technologies. (Image source: Steven Millstein/Flickr)

The Saudi Arabian Monetary Authority (SAMA) and the United Arab Emirates Central Bank (UAECB) have jointly launched a common digital currency project ?Aber? that will be used in financial settlements between Saudi Arabia and the UAE through blockchains and distributed ledgers technologies

More Articles …