Security

Displaying 1 - 10 of 169

Smart platform goes beyond traditional surveillance systems

Smart platform goes beyond traditional surveillance systems
Teleste will launch a new solution for situational awareness and incident management at Securex 2018 in Poland. The solution, called S-AWARE, has been designed to expand the scope of traditional security and operations control systems by harnessing them with a new layer of data analytics and intelligence. The solution provides operating personnel with a powerful tool to sharpen their decision-making process by taking advantage of versatile types of data from a variety of sources.
18th April 2018

Expanding banking business with SECORA Pay from Infineon

Expanding banking business with SECORA Pay from Infineon
exceet Card AG is further strengthening its portfolio with SECORA Pay security solutions from Infineon Technologies AG. Card manufacturers can easily integrate them thanks to the combination of dual interface chip technology with the Coil-on-Module (CoM) packages. These also make the card more robust and reliable. “SECORA Pay provides us with certified EMV* solutions from a single source,” said Ulrich Reutner, CEO of exceet Card Group AG.
18th April 2018

Mitigating security vulnerabilities like Meltdown and Spectre

Mitigating security vulnerabilities like Meltdown and Spectre
Rambus has announced the availability of the CryptoManager Root of Trust, a fully programmable hardware security core built with a custom RISC-V CPU. The secure processing core creates a siloed architecture that isolates and secures the execution of sensitive code, processes and algorithms from the primary processor.
17th April 2018


Report depicts evolving cybersecurity threat landscape

Report depicts evolving cybersecurity threat landscape
The 2018 Trustwave Global Security Report has been released by Trustwave and has revealed the top security threats, breaches by industry, and cybercrime trends from 2017. The report is derived from the analysis of billions of logged security and compromise events worldwide, hundreds of hands-on data-breach investigations and internal research. Findings depict improvement in areas such as intrusion to detection however, also showed increased sophistication in malware obfuscation, social engineering tactics, and advanced persistent threats.
13th April 2018

End-to-End security ensures virtualisation is viable

End-to-End security ensures virtualisation is viable
In applications such as industrial control and telecom the business-level benefits of virtualisation are becoming more understood. Companies worldwide have analysed real-world use cases and concluded that major savings in lifetime operational costs are achievable by deploying software-based, virtualised systems compatible with open standards, instead of traditional fixed-function physical equipment based on proprietary, vertically integrated architectures.  Guest blog written by Charlie Ashton.
11th April 2018

Brits turns to smart tech to protect their smart homes

Brits turns to smart tech to protect their smart homes
Households in the UK are increasingly turning to smart technology to protect their homes, according to new research. The survey of 2,001 British adults carried out by gadgets and technology e-tailer, LaptopsDirect.co.uk, found that more than a third of Brits (31%) are using some form of smart security gadget in their home. Perhaps not surprisingly, cost was an important factor when it comes to the increasing uptake of security technology, as 38% of those surveyed said the price is now more accessible.
6th April 2018

Securing IoT applications with Mbed TLS

Attacks on IoT products have increased in recent years as a result of vulnerabilities relating to communication security, among others, being compromised.
28th March 2018

#deletefacebook

#deletefacebook
At some point, every active Facebook user has likely given in to the temptation of doing a quiz. These marvellous multiple choice questions can explain traits of your personality, confirm your political views, predict the time of your death according to life habits, or even assign you a character on Game of Thrones. So it is particularly terrifying when you learn that these quizzes could have purposes beyond mere fun.
20th March 2018

F-Secure’s aviation cyber security services takes off

F-Secure’s aviation cyber security services takes off
Trust is everything in the aviation industry. And a successful cyber attack – even a minor one against something like an in-flight entertainment system – could undermine confidence in airlines or even the entire aviation industry. That’s why global cyber security provider F-Secure has launched a specialised Aviation Cyber Security Services offering that’s designed to help airlines and similar organisations protect their aircraft, infrastructure, data, and reputations.
16th March 2018

New algorithms added to DesignWare security protocol

New algorithms added to DesignWare security protocol
Synopsys has announced that it has added the ChaCha20 and Poly1305 (RFC7539) algorithms to its DesignWare Multipurpose Security Protocol Accelerator IP, enabling designers to efficiently implement the latest encryption and authentication functionality to protect their IoT SoCs. The Security Protocol Accelerator IP increases security protocol performance by supporting efficient data sequencing as well as parallel processing of cryptographic operations such as authentication and encryption/decryption.
15th March 2018


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

The Future of Industrial IoT
26th April 2018
Germany Munich
Developing secure and scalable IoT solutions
21st June 2018
United Kingdom Cocoon Networks, London
The Security Event 2019
9th April 2019
United Kingdom NEC, Birmingham