F-Secure News
WithSecure™ (formerly known as F-Secure Business) has continued to evolve its Elements cloud-based security platform with the addition of several new capabilities and services that can help organisations manage risks associated with cyber attacks. WithSecure™ Elements, which can be managed by a trusted service provider or in-house, provides organisations with the flexibility to pick and choose the capabilities they need via different modules. Available modules include Endpoint Prote...
Sustainability is a challenge that affects every person and organisation on the planet. To help overcome this challenge, WithSecure™ (formerly known as F-Secure Business) has created a W/Sustainability program that commits it to operate as an ethical, equitable, and environmentally responsible global citizen. W/Sustainability is a program that embeds sustainability and transparency into WithSecure’s strategy and operations. The program was built based on surveys and in-depth intervi...
The impact of cyber attacks on vulnerable populations serviced by non-governmental organisations (NGOs) is often overlooked, but they can affect communities already exposed to poverty, violence, and other threats/risks. WithSecure™ (formerly known as F-Secure Business) is now offering the support of its cyber security professionals to these groups through the CyberPeace Builders programme. The programme, managed by the CyberPeace Institute, connects cyber security professionals with NGOs....
International Security Expo is returning to Olympia London, in London, United Kingdom, in September 2021, with a range of pavilions and zones, each dedicated to a particular field of security, in order to help visitors navigate the show with ease. One of the zones, the Disaster & Resilience Zone, will combine the latest innovations in crisis management with a comprehensive education programme. International Security Expo 2021 Attendees will be able to network face-to-face with the zone&rs...
The new ‘Internet of Things’ world is characterised by millions upon millions of connected devices. With more insecure devices and network access points than ever before, ‘Secure-by-Design’ principles are essential for protecting against growing cyber security threats. Internet-of-Things (IoT) world Over the last few years, digital technologies have transformed the world, affecting all sectors of business activity and daily life. The result is an Internet-of-Things (IoT...
This question is key in today’s security world, when focusing on security cameras. As part of the IoT world, security cameras of today are playing important roles not only in the security area, but also in providing intelligence to accelerate operational efficiency and decision-making in many other business areas. As they become smarter and more complex, their cybersecurity risks also grow. In recent years, the world experienced several examples of cybersecurity incidents with cameras, wi...
What new horizons does AI have to offer? And how powerful is the blockchain? How can I defend myself against cyberattacks? From 24 to 28 June 2019, the CEBIT d!talk conferences will be dedicated to exploring the future of digital transformation. The topic-oriented CEBIT Summits represent a key element of the d!talk program, focusing on key technologies for the digital economy, including their impact and application opportunities for selected industries. Speaker topics will include artificial in...
Browse security news
- By event
- Milipol Qatar 2024
- Secutech Thailand 2024
- C-Touch & Display Shenzhen 2024
- Data Centre & Cloud Innovation Summit 2024
- Black Hat Middle East 2024
- Inter Airport Southeast Asia (IASEA) 2025
- PACK EXPO Chicago 2024
- ADIPEC 2024
- East Tech 2024
- Smart City Expo World Congress 2024
- China International Import Expo (CIIE) 2024
- View more
Verkada Command Connector for Camera Integration & Cloud Management
Hikvision One-Stop SMB Solutions
Dahua X-spans Wizmind Network PTZ Camera
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download