Security

  • Think Local: How to Migrate Intelligence from the Cloud to Embedded Devices at the Edge

    Think Local: How to Migrate Intelligence from the Cloud to Embedded Devices at the Edge

    Adding more cloud compute won’t solve the problem of managing exponentially growing quantities of data for IoT devices. We need to shift much of the “thinking” from the cloud to endpoint devices...

    Download PDF
  • Medical Device Safety and Security: Obvious but not easy to achieve

    Medical Device Safety and Security: Obvious but not easy to achieve

    With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two...

    Download PDF
  • Why the Security Market is Taking a Closer Look at the Use of Radar Sensors as Opposed to the Popular Passive Infrared (PIR)

    Radar technology is an excellent contender to PIR, as it offers added capabilities. PIR has certain limitations that are not desirable in the security market for which radar detection can overcome.

    Read Article
  • OmniVision Expands Nyxel NIR and ULL Sensor Resolution to 4 MP

    OmniVision Expands Nyxel NIR and ULL Sensor Resolution to 4 MP

    OmniVision Technologies released the OS04A10, a 2.9-micron pixel image sensor with 4-megapixel (MP) resolution, adding to the Nyxel family of near-infrared (NIR) and ultra-low light (ULL) sensors.

    Read Article
  • AMG Systems Releases Mini Media Converter for Security and Transport Applications

    Housed in a mini chassis, AMG’s new Mini media converters are ideal for connecting field-based equipment to Ethernet networks over long distances via fiber.

    Read Article
  • Take the Steps to Secure Your Software Supply Chain – What are You Waiting For?

    Take the Steps to Secure Your Software Supply Chain – What are You Waiting For?

    Learn how binary scanning is emerging as a critical activity for securing the complex software supply chain that exists in vehicles.

    Download PDF
  • Demystifying the Physically Unclonable Function (PUF)

    PUF stands for physically unclonable function. From a technical standpoint, PUF exploits minute differences in silicon that appear from chip to chip to create a binary value.

    Read Article
  • How to Establish an Effective Data Quality Policy for Your Business

    By focusing on ad-hoc incident resolution, organizations struggle to identify and address recurring data quality problems in a structural way.

    Read Article
  • Microchip AC164160 Secure IoT Sensor Node

    Microchip AC164160 Secure IoT Sensor Node

    This development/evaluation board features Wi-Fi connectivity, an ATmega4808 processor, and an ATECC608A cryptographic co-processor to restrict data to authorized users and systems.

    Read Article
  • CES 2019: Attendance Slightly Down, Innovation Way, Way Up

    CES 2019: Attendance Slightly Down, Innovation Way, Way Up

    Attendance may have been down at the 2019 Consumer Electronics Show, based on observed foot traffic alone. But, that didn't stop electronics vendors from innovating at the highest levels. From...

    Read Article
  • Another Record Year for Vulnerabilities … Time to Join the CIA?

    No, not that CIA. I mean the security concept known as the CIA Triad that refers to Confidentiality, Integrity and Availability.

    Read Article
  • OCF 1.0 ratified by ISO/IEC JTC 1 as secure IoT interoperability protocol

    The OCF standard will be published as ISO/IEC 30118 (Parts 1-6).

    Read Article
  • "Zero Touch" IoT Security Is Key to Continued Growth

    "Zero Touch" IoT Security Is Key to Continued Growth

    By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...

    Download PDF
  • IoT Security (Finally) Delivers ROI

    IoT Security (Finally) Delivers ROI

    To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...

    Download PDF
  • Securing the IIoT with Flexible Firewalls

    Securing the IIoT with Flexible Firewalls

    Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial firewall appliances. Industrial firewall...

    Download PDF
  • A 4-Step Guide to Security Assurance for IoT Devices

    A 4-Step Guide to Security Assurance for IoT Devices

    Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.”

    Download PDF
  • Containerized Linux: The Secret to IoT Security

    Containerized Linux: The Secret to IoT Security

    A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.

    Download PDF
  • Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs6:22

    Hex-Five Multi-Zone Security for RISC V Simplifies the Terrible TEEs

    Trusted Execution Environments (TEEs) such as Arm TrustZone, while well-intentioned, present challenges for engineers. First, they doesn't allow for partitioning between many sensitive functions withi

    Watch Video
  • Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon5:59

    Spectre, Meltdown, and Tortuga Logic's Hardware Security Verification at Arm TechCon

    The Spectre and Meltdown vulnerabilties resulted from speculative execution, designed to satisfy our need for speed. These could have been prevented through the use of hardware security verification,

    Watch Video
  • So, How Secure are your Coding Practices? Ask AdaCore5:53

    So, How Secure are your Coding Practices? Ask AdaCore

    Developing secure code is no longer optional, but that doesn't mean it's easy. Some software engineers use vulnerability databases like CWE and OWASP to ensure their code is robust as possible, howeve

    Watch Video
  • loading
    Loading More...