Security

Displaying 11 - 20 of 352

UK university defences easily defeated by hackers

UK university defences easily defeated by hackers
Ethical hackers from Jisc were tasked with testing the cyber defences of UK universities, to see how long it would take them to access high value data. Recently, UK university research projects have more frequently become the target of hacking and data breeches, with reportedly more than 1,000 attacks in 2018.
4th April 2019

Certification for experts in industrial cyber security

Certification for experts in industrial cyber security
Global leader in testing, inspection and certification services, TÜV Rheinland, has announced the launch of a new personnel certification program to address the demand for cyber security expertise in the complex and challenging operational technology (OT) and industrial security sector. The new Certified Operational Technology Cybersecurity Professional Program is being offered in response to the growing demand for specialists in industrial cyber security.
4th April 2019

The Charter of Trust takes step forward to advance cyber security

The Charter of Trust takes step forward to advance cyber security
At the Munich Security Conference in February 2018, nine organisations signed the world’s first joint charter for greater cyber security. A year on, the Charter of Trust has grown to 16 members. In addition to Siemens and the Munich Security Conference, the signatories include AES, Airbus, Allianz, Atos, Cisco, Daimler, Dell Technologies, Deutsche Telekom, Enel, IBM, NXP, SGS, Total and TÜV Süd. 
4th April 2019


Improving ATM security

Improving ATM security
While the security of Automated Teller Machines is not necessarily ‘life critical’ as with many other industries (think transportation, medical and some industrial applications), there are certainly financial and identity theft risks associated with these devices. There is much data on the web regarding the various ATM attack vectors, the estimated number of annual hacks and the cost to the industry. Guest blog by Rick Anderson, Wind River.
3rd April 2019

Turnkey solution offers robust security

Turnkey solution offers robust security
A turnkey, hardware-based solution from Infineon Technologies that provides robust security to a range of diverse applications, including Internet of Things (IoT), smart homes, medical devices, and drones is in stock at Mouser Electronics. The OPTIGA Trust X is based on an advanced security controller built on Elliptic Curve Cryptography (ECC) NIST P256, AES128, and SHA-256, plus built-in tamper-proof nonvolatile memory to greatly enhance overall system security.
2nd April 2019

Cyber breaches are more common than rainy days in the UK

Cyber breaches are more common than rainy days in the UK
New research has revealed that many UK businesses are risking a potential data breach due to a lack of adequate server security. A survey of 1,050 UK workers in full or part-time employment, carried out by technology services provider, Probrand has revealed that a shocking 44% of businesses are failing to properly protect their client and employee data by not adequately securing their server.
1st April 2019

Time to get serious about protecting 5G networks

Time to get serious about protecting 5G networks
The British Huawei oversight body published today a scathing report documenting vulnerabilities in Huawei’s equipment. Here, the Consumer Choice Center’s Senior Privacy Fellow Mikołaj Barczentewicz has commented on policy conclusions to draw from the report.
29th March 2019

Platform solution supporting IEC 62443 international standard

Platform solution supporting IEC 62443 international standard
Supplier of advanced semiconductor solutions, Renesas Electronics, has announced plans to release a security solution based on the Renesas RZ/G Linux Platform that will reduce the amount of time required for users to obtain certification under IEC 62443-4-2, a new international standard for security technologies used to protect industrial control systems from cyber attacks. 
28th March 2019

Continuous response needed to fight modern threats

Continuous response needed to fight modern threats
As the threat landscape continues to evolve, so does the need for organizations’ approaches to defending against the business impact of cyber attacks. In light of this trend, cyber security provider F-Secure is calling for greater emphasis on both the preparedness for a breach as well as fast and effective containment that covers the correct balance of people, process and technology.
27th March 2019

Debunking myths surrounding identity governance

Debunking myths surrounding identity governance
It’s no secret that technology has come in leaps and bounds since the invention of the personal computer in the 80s. In the 90s we saw the World Wide Web burst onto the scene, shortly followed by the arrival of the iPhone in the early 2000s. Today, as we approach 2020, we’re facing biotech, blockchain, and bots. With this technological evolution far from slowing down, enterprises across the globe now need to tackle the growing challenge of governing their workforces’ access to data amid the digital transformation.  
27th March 2019


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

IoT Tech Expo 2019
25th April 2019
United Kingdom Olympia, London
European Microwave Week 2019
29th September 2019
France Porte De Versailles Paris
IoT Solutions World Congress 2019
29th October 2019
Spain Barcelona