Security
Secure knowledge for better cyber security
The notion that ideas become reality especially applies to cyber security in critical national infrastructure. Security breaches can result in very real losses of water or energy; but ideas around cyber threats are obscured by misconceptions around the nature of such attacks and how to deal with them. Here Sean Robinson, Service Leader of automation specialist Novotek UK and Ireland, has explained how a compact controller could negate these ...
Answering the cyber security demand in Africa
Cyber Risk Aware has been selected as the security awareness education and phishing simulation solution for Liquid Telecom, a pan-African telecommunications group, within its newly unveiled Cyber Security unit.
Fujitsu develops technology to block facial authentication fraud
Fujitsu Laboratories has announced the development of a facial recognition technology that uses conventional cameras to successfully identify efforts to spoof authentication systems. This includes impersonation attempts in which a person presents a printed photograph or an image from the internet to a camera.
How GOV.UK will verify new influx of benefit applicants with selfies
Mitek and Digidentity, a digital identity verification solutions provider in Europe, have securely scaled operations to enable faster onboarding of those registering with GOV.UK Verify. Working together, Mitek and Digidentity ensured processing speeds of up to 400 applicants per minute to accommodate the growing need for UK nationals and residents to apply for government services, including Universal Credit, during the pandemic.
Defending the IIoT
By creating a world in which physical objects seamlessly integrate into the information network, transferring data between themselves and the cloud, the IIoT is transforming everything from wind turbines and factory automation to critical infrastructure. However, with this smart, connected world comes an increased and very real threat of cyber attacks. Josef Haid of Infineon Technologies explains.
The anatomy of security microcontrollers for IoT
At a time when implementing security in embedded designs seems an overwhelming task, microcontrollers (MCUs) specialising in security features are coming forward to enable security at the inception of the embedded design. That’s a good thing, because there’s no question that a new breed of embedded solutions is needed to secure the Internet of Things (IoT) applications. Rolf Horn, Applications Engineer at Digi-Key Electronics, explain...
Paessler and Flowmon deliver security for IT networks
Paessler has announced an alliance with global network intelligence company, Flowmon Networks to offer more extensive IT monitoring and security for IT networks combined with in-depth analysis. IT monitoring specialist Paessler and Flowmon Networks have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. The integration ensures availability, performanc...
3D printing poses a growing threat to people’s privacy
3D printing technology poses a 'grave and growing threat' to individual privacy because of the potential for products to reveal private information about individuals, experts have warned. People could use cameras, laptops or mobile phones to track and trace the origins of 3D printed objects and how they have been used if they have watermarks.
ERA Protect Alarm accredited by the BSI IoT
ERA has launched the ERA Protect Alarm, part of its next generation wireless smart security system – ERA Protect. The BSI IoT (British Standards Institute Internet of Things) accredited Alarm works with other ERA Protect products, including the Outdoor Camera and the Floodlight Camera, via the intuitive, easy to use smartphone app, which allows easy management of all components of the security system at anytime from anywhere in the world.
IoT security suite wins key endorsements
Key security endorsements have been announced by Silicon Labs. The company’s Secure Vault security suite of hardware and software technologies dedicated to securing Internet of Things (IoT) devices against growing and evolving threats has earned third-party IoT security certifications from both PSA Certified and the ioXt Alliance.