In the 4,300 tests conducted, 95% of the targets were found to have some form of vulnerability (a 2% decrease…
POWERGRID, IISc, and the FSID are partnering to establish the POWERGRID Centre of Excellence in Cybersecurity in Power Transmission and…
The MoU marks Smiths Detection's first manufacturing operation in India.
In response to software supply chain attacks, 73% of organizations surveyed say they have increased their efforts to secure their…
Around 74% of large enterprises in India embed IT security in the planning, initiation, and assessments of all new business…
NIST has selected specialized NXP Crystals-Kyber algorithm for post-quantum cryptography standard development.
Mouser Electronics explores the importance of incorporating security into every stage of the design process.
Analog Devices' DS28E30 1-Wire ECDSA Secure Authenticator helps protect products from counterfeiting or misuse.
In IISc's breakthrough TRNG device, random numbers are generated using the random motion of electrons.
"If everything is connected, everything can be hacked."