Cyber Security
Infineon introduces automotive security controller SLI37
Infineon Technologies has introduced the SLI37 automotive security controller: an easy to design in and reliable trust anchor to secure safety-critical automotive applications like 5G-ready eUICC (eCall), V2X communication, car access or SOTA updates.
China’s 5-Year Plan and its implications for the cyber threat landscape
SecAlliance has reported on China’s Five-Year Plan and its implications for the Cyber Threat Landscape. There are clear indicators and factors pointing to more overt and confident cyber behaviour from the Chinese Communist Party (CCP), which is likely to be coupled with large scale and continuous offensive cyber operations, according to a report published by cyber threat Intelligence company, SecAlliance.
Winning the cybersecurity race
Kiera Sowery attended a panel discussing the importance of keeping up with the cybersecurity race at DSEI, the defence technology exhibition at London’s ExCel Centre. The panellists explored the education pathways into the defence industry.
Firebox M Series by WatchGuard for cyber security
Firebox M Series combines security, performance, flexibility and visibility for the WatchGuard Unified Security Platform WatchGuard Technologies hFirebox M Series combines security, performance, flexibility and visibility for the WatchGuard Unified Security Platform has announced the release of its new Firebox M290, M390, M590, and M690 unified threat management appliances for small and medium-sized businesses.
Psst!! element14 unveils Spy Nerd Design Challenge
Securing data is important in a number of industriesso element14 has launched the Spy Nerd Design Challenge, giving community members the opportunity to develop security or spy-themed projects.
Edge to cloud security with cryptographic controller
The ultra-low power MAXQ1065 cryptographic controller from Analog Devices features its proprietary ChipDNA physically unclonable functionality (PUF) technology.
The solution to the epidemic of Network Security breaches
If your personal information has ever fallen victim to a large network security breach, you know it’s no laughing matter. From dating sites and social media platforms to credit card companies, health insurance companies and banks, to government agencies, no one wants their sensitive information caught in the web of a security breach.
Incident readiness and response work for cyber security
While it’s important to engage incident response during a cyber security incident, F-Secure Consulting’s global incident readiness and response offerings put equal emphasis on readiness as a strategy for mitigating the risk of cyber attacks.
Cyber protection for Israel’s water supply
Israel’s water supply came under major attacks last year by what foreign intelligence sources described as an attempt to disrupt the country’s critical infrastructure. The apparent goal of the attacks was to raise the level of chlorine in the water supply by changing the logic of the Programmable Logic Controller without raising any alarms.
Eurotech achieves IoT security PSA certification
Eurotech has announced its Multi-service IoT Edge Gateway, ReliaGATE 10-14 and Everyware Software Framework has achieved PSA certification to Level 1. This independent IoT security certification offers customers and partners standards-based compliance and will help organizations overcome barriers to global IoT adoption.