Security
Defending the IIoT
By creating a world in which physical objects seamlessly integrate into the information network, transferring data between themselves and the cloud, the IIoT is transforming everything from wind turbines and factory automation to critical infrastructure. However, with this smart, connected world comes an increased and very real threat of cyber attacks. Josef Haid of Infineon Technologies explains.
The anatomy of security microcontrollers for IoT
At a time when implementing security in embedded designs seems an overwhelming task, microcontrollers (MCUs) specialising in security features are coming forward to enable security at the inception of the embedded design. That’s a good thing, because there’s no question that a new breed of embedded solutions is needed to secure the Internet of Things (IoT) applications. Rolf Horn, Applications Engineer at Digi-Key Electronics, explain...
Paessler and Flowmon deliver security for IT networks
Paessler has announced an alliance with global network intelligence company, Flowmon Networks to offer more extensive IT monitoring and security for IT networks combined with in-depth analysis. IT monitoring specialist Paessler and Flowmon Networks have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. The integration ensures availability, performanc...
3D printing poses a growing threat to people’s privacy
3D printing technology poses a 'grave and growing threat' to individual privacy because of the potential for products to reveal private information about individuals, experts have warned. People could use cameras, laptops or mobile phones to track and trace the origins of 3D printed objects and how they have been used if they have watermarks.
ERA Protect Alarm accredited by the BSI IoT
ERA has launched the ERA Protect Alarm, part of its next generation wireless smart security system – ERA Protect. The BSI IoT (British Standards Institute Internet of Things) accredited Alarm works with other ERA Protect products, including the Outdoor Camera and the Floodlight Camera, via the intuitive, easy to use smartphone app, which allows easy management of all components of the security system at anytime from anywhere in the world.
IoT security suite wins key endorsements
Key security endorsements have been announced by Silicon Labs. The company’s Secure Vault security suite of hardware and software technologies dedicated to securing Internet of Things (IoT) devices against growing and evolving threats has earned third-party IoT security certifications from both PSA Certified and the ioXt Alliance.
Local governments target of ransomware attacks in 2020
Local government bodies are the most likely target for ransomware attacks, according to new threat spotlight research from Barracuda Networks. The research, which identified and analysed 71 global ransomware incidents in the last 112 months, found that 44% of all observed ransomware attacks in 2020 have been aimed at municipalities.
LDRA delivers secure software development resource
LDRA has launched the Secure Software Development Resource Centre. The online portal guides developers through the phases of the software development lifecycle—from requirements, design, model, code, and verification whether developers are using traditional V-model, waterfall lifecycle, or an agile approach.
Lack of cyber security preparedness killing growth
Small and medium-sized enterprises (SMEs) are the backbone of the UK economy. In recent decades, British SMEs have accounted for 99.9% of the business population, totalling 5.8 million. A recent survey by the Wall Street Journal found that small companies are the least prepared for cyber attacks and have the least cyber security.
SailPoint Predictive Identity secures COVID-19 technologies
Securing today’s mostly virtual workforce is top of mind as the demand for access to applications and systems in the cloud grows exponentially. SailPoint’s latest updates to the SailPoint Predictive Identity platform will be the co-pilot in any organisation’s security strategy, safeguarding the remote workforce's access needs.