2022-09-16 - Smiths Detection

Smiths Detection Inks MoU with BEL to Manufacture X-ray Screening Technologies in India

The MoU marks Smiths Detection's first manufacturing operation in India.

2022-08-17 - Synopsys Inc.

Majority of Organizations Increasing Their Software Supply Chain Security Efforts

In response to software supply chain attacks, 73% of organizations surveyed say they have increased their efforts to secure their…

2022-08-05 - International Data Corp.

Majority of Large Indian Enterprises Increase Focus on Security Spending in 2022

Around 74% of large enterprises in India embed IT security in the planning, initiation, and assessments of all new business…

2022-07-07 - NXP Semiconductors

NXP Helps Standardize Next-gen Security with Post-quantum Cryptography

NIST has selected specialized NXP Crystals-Kyber algorithm for post-quantum cryptography standard development.

2022-06-15 - Mouser Electronics

Mouser Electronics Tackles Designing for Security in Third “Empowering Innovation Together” Episode

Mouser Electronics explores the importance of incorporating security into every stage of the design process.

2022-06-09 - Analog Devices Inc.

Analog Devices’ Secure Authenticator Protects Products from Counterfeiting

Analog Devices' DS28E30 1-Wire ECDSA Secure Authenticator helps protect products from counterfeiting or misuse.

2022-05-31 - Rohith KMS, Indian Institute of Science (IISc)

Randomly Moving Electrons Can Improve Cybersecurity

In IISc's breakthrough TRNG device, random numbers are generated using the random motion of electrons.

2021-12-17 - Sharon Hagi

Security Standards a Must for Consumer IoT

"If everything is connected, everything can be hacked."

2021-11-19 - Synopsys

Synopsys Research Finds Vulnerabilities in 97% of Applications

Synopsys' 2021 Software Vulnerability Snapshot report examines prevalence of vulnerabilities identified by Synopsys Application Security Testing Services.

2021-09-27 - Ann R. Thryft

SolarWinds Fallout: Cloud Security is the Weak Link

Misconfigurations and the resulting security vulnerabilities are soaring as companies rush to the cloud.