Home cyber
 

Keywords :   


Tag: cyber

Pentagon accuses China of cyber attacks on U.S military, business targets

2013-05-07 17:41:14| InfoWorld: Top News

Chinese cyber espionage activities are fueling a rapid modernization of the country's defense and high tech industries, the Pentagon said in an unusually candid assessment of China's military and security developments last year.

Tags: business china military attacks

 

Hypervisor Software protects against cyber threats.

2013-05-06 14:30:55| Industrial Newsroom - All News for Today

With added security features, LynxSecure v5.2 offers real-time detection, alert, and protection against new cyber threats, including zero-day rootkits and bootkits. Adding virtualization to separation kernel allows for multiple guest operating systems, both real-time and general purpose, to run in secure domains on single embedded system. When LynxSecure is used on embedded devices, it can help detect malicious infections as they inject their payload, long before start of actual cyber attack. This story is related to the following:Operating Systems Software | Anti-Virus Software

Tags: software cyber threats protects

 
 

SCIT Labs to develop new server prototype to safeguard against cyber attacks

2013-05-01 10:10:00| Naval Technology

The US Navy has awarded a contract to Self-Cleansing Intrusion Tolerance (SCIT) Labs to develop a software-protected server prototype that can help in preventing tactical cyber attacks.

Tags: server develop labs attacks

 

Emerson Receives Certification for Process Systems Cyber Security

2013-04-30 06:00:00| Chemical Processing

Emerson Process Managements DeltaV digital automation system and its project and engineering support services have passed annual best practice standards set by Wurldtech Security Technologies.

Tags: process systems security certification

 

Embedded Firewall Software protects against cyber attacks.

2013-04-24 14:30:07| Industrial Newsroom - All News for Today

Designed to meet ANSI/ISA/IEC/TS 62443 standards for cyber security, Floodgate™ Packet Filter adds firewall security to RTXC™ Quadros™ real-time operating system (RTOS)-powered devices to protect against Internet-based attacks. Solution provides Stateful Packet Inspection (SPI) and rules-based filtering and is designed for use in embedded devices with limited memory and processor speeds that require secure network implementation certified to such standards as ISASP 99. This story is related to the following:Computer Hardware and PeripheralsSearch for suppliers of: Computer Security Software |

Tags: software attacks firewall cyber

 

Sites : [117] [118] [119] [120] [121] [122] [123] [124] [125] [126] [127] [128] [129] [130] [131] [132] [133] [134] [135] [136] next »