ST’s Dynamic NFC/RFID Tags which is a part of the ST25 family, features an EEPROM memory that can be accessed either by the I2C interface or by the RF (ISO15693/ISO14443) interface operating... Read more
The internet usage patterns and predictions for India highlight that the demand for constant connectivity and internet continues to grow precipitously. The attractive demographics, popularit... Read more
The natural and fool-proof eye-based identification technology is incredibly fast, easy to use while being safe and secure if compared to other identification mediums existing in the space s... Read more
Comprehensive network modeling helps security engineers extend traditional security processes into hybrid enterprise networks Ravid Circus, Skybox VP, Products Imagine an IT security team as... Read more
The business scenario is in upward flux with the empowered customer accessing boundless information through the media and internet. The constant growth in information technology and digital... Read more
This time it is more sensible act for Symantec as it has acquired Blue Coat Symantec APAC partner meet organized in Tokyo, with a large contingent of Indian partners, showcased the growing... Read more
The rise of mobile and IoT applications is fueling the growth of serverless computing platforms Mohiuddin Khan Inamdar, Senior Solutions Architect at Xavient Information Systems shares “Serv... Read more
DDoS protection appliances are powerful technologies that mitigate DDoS attacks. Installed on-premise in the organizations’ data center, the best of these appliances detect and mitigate DDoS... Read more
Women need to see that though they are underrepresented in cybersecurity, they are not an anomaly. They, like women before them, have value to contribute to the industry and their efforts ca... Read more
Rather than installing applications on the company’s premises, businesses are turning to providers who permit access to a host of cloud-based applications at a lower cost. The cloud helps bu... Read more