957 Results for:USB
- Sort by:
Symantec unveils AI-based protection for critical infrastructure
05 Dec 2018Cyber security firm has unveiled what it claims to be the industry’s first neural network to protect critical infrastructure from USB-borne malware attacks Read More
Using Portable-VirtualBox to run any OS from a USB device
10 Sep 2012Portable-VirtualBox allows you to run OSes from a USB drive, which helps you test them for use in server and desktop virtualization environments. Read More
What purpose do thin client OSes serve?
06 Feb 2024Thin clients can act as hubs for virtual desktop OSes or run their own OSes locally. These OSes are made to support a centralized computing model, which offers many benefits. Read More
Demystifying the top five OT security myths
25 Oct 2023Goh Eng Choon, president of ST Engineering’s cyber business, outlines the common myths around OT security in a bid to raise awareness of the security challenges confronting OT systems Read More
How to use the iPadOS file manager in the enterprise
14 Mar 2023Organizations can use the iPadOS Files app to manage files locally or in the cloud. Learn the pros and cons of both storage types and how to use them in the native file manager. Read More
Ransomware attack on major Chinese lender disrupts financial markets
10 Nov 2023The financial services arm of one of the world’s largest banks was taken offline by a supposed LockBit ransomware attack, causing problems for US markets Read More
10 robust USB drive security tools for India Inc
25 Oct 2012USB drives are ubiquitous in Indian businesses, but pose security threats as they are easily lost/stolen. Here are 10 tools to ensure robust USB security. Read More
Belkin's Best Thunderbolt 3 Dock
25 Oct 2019Belkin's Best Thunderbolt 3 Dock, model F4U095, makes it easy to dock into a full-blown desktop experience in the office. Unplug a single USB-C cable, and it's ready for mobile use. Read More
How to train employees to avoid ransomware
20 Sep 2023Do your employees know what to do if ransomware strikes? As your organization's first line of defense, they should receive regular trainings on ransomware prevention and detection. Read More