A10 Networks Introduces One-DDoS Protection to Expand Defenses against Denial of Service Attacks

A10 Networks Introduces One-DDoS Protection to Expand Defenses against Denial of Service Attacks

Posted by SGCS Admin, 17-04-2018

  SINGAPORE – April 17, 2018 – A10 Networks (NYSE: ATEN), a provider of intelligent and automated cybersecurity solutions, today announced A10 One-DDoS Protection, featuring software...

Cyberattacks on Connected Aircraft Are Happening Right Now

Cyberattacks on Connected Aircraft Are Happening Right Now

Posted by SGCS Admin, 16-04-2018

As commercial aircraft increasingly become connected to the larger Internet of Things, the potential for safety risks also rise, the head of Thales’ business operations in the U.S. said Wednesda...

Managing Cybersecurity Risks with Next Generation Kaspersky Endpoint Security for Business

Managing Cybersecurity Risks with Next Generation Kaspersky Endpoint Security for Business

Posted by Admin, 16-04-2018

Enterprise-ready scalability, next generation technologies and EDR-integration in the new version of Kaspersky Lab’s flagship product for endpoints The latest trends in cybercrime have seen...

NSFOCUS Threat Intelligence integrates with Palo Alto Networks Next-Generation Firewall, enabling actionable threat intelligence for customers

NSFOCUS Threat Intelligence integrates with Palo Alto Networks Next-Generation Firewall, enabling actionable threat intelligence for customers

Posted by Admin, 12-04-2018

NSFOCUS and Palo Alto Networks combined Threat Intelligence Service and Next-Generation Firewall to provide complete visibility into the global threat landscape   SINGAPORE, April 12, 2018...

Enterprises have too many cybersecurity vendors, lack coordination: ServiceNow

Enterprises have too many cybersecurity vendors, lack coordination: ServiceNow

Posted by SGCS Admin, 11-04-2018

With data breaches now one of the biggest worries, the problem may not be having enough cyber defences, but having too many of them from different vendors and not coordinating the effort. At least th...

criminals conceal miners under the guise of legitimate thematic applications

criminals conceal miners under the guise of legitimate thematic applications

Posted by Admin, 10-04-2018

The hot topic of crypto-currency mining could not be ignored by cyber criminals, as they seek to increase their profits. They are mining on computers, servers, laptops and mobile devices. However, it ...