Internet Of Things | IoT

#
Tag Archives: security
By

Samsung’s Secure Element solution features eFlash memory and new dedicated security software. Samsung Electronics Co., Ltd., today introduced its integrated Secure Element (SE) solution for Internet...

By

ST is helping connected car makers to address the cyber-security challenges with its new automotive processors that feature a dedicated, built-in security module. The new Telemaco3P telematics and...

By

Today, a new vulnerability affecting the security of WPA2 protected wireless networks was disclosed. The Key Reinstallation Attack (KRACK) can render the network encryption transparent, allowing traffic...

By

On 5 October, I had the pleasure of speaking at the New York Metro Joint Cyber Security Conference, which brings together a community of security practitioners from the New York Metro area. Two talks stood...

By

Encryption technologies help protect user data from theft and they help secure critical infrastructure and services that societies depend on. But, encryption is also available to criminals and terrorists....

By

Often, people are considered the weakest link in a security chain, as they are fooled into revealing passwords or choose passwords that are easily decipherable. This is a misconception that can lead some...

By

The Deploy360 team is back from ION Malta, which took place on 18 September alongside an ICANN DNSSEC Training Workshop. We again thank our sponsor Afilias for making this possible, and are now working...

By

Home security from Ring On this week’s Internet of Things Podcast, Stacey Higginbotham and Kevin Tofel discuss Ring’s new security system, ADT pairing up with SmartThings and why home security...

By

Solution Addresses Critical Issues of Bringing Large-Scale Internet of Things Deployments Online and Securely Managing Devices and Data. At the IoT Solutions World Congress, Intel addressed the challenges...

By

When considering embedded IoT solutions, security is a balance between three parts that are often in tension: economic cost, benefit, and risk. Cost – Pertains to the price for designing security...

By

Nasrin Rezai, the global chief information and product security officer at GE, (left) talking to me about how CISOs need to view security when everything can be connected. Photo by Phillip Van Nostrand...

By

Merging the cyber and the physical aspects of security for an Internet of Things (IoT) infrastructure is a tall order for many businesses. That’s because it requires an end-to-end strategy to secure...