Security

Displaying 311 - 320 of 331

Cloud security: a thorn in the side of security professionals

Cloud security: a thorn in the side of security professionals
Provider of Unified Security Management (USM) and crowdsourced threat intelligence, AlienVault, has released the results of a survey showing that cloud security remains a thorn in the side of security professionals, with many still struggling to monitor this environment effectively. Conducted at RSA 2017, 974 conference participants weighed in on cloud security and IoT monitoring to provide an inside look at the challenges and concerns plaguing companies today, along with the opportunities and benefits associated with each technology.
30th March 2017

Power, performance and security: the new requirements for IoT device controllers

Power, performance and security: the new requirements for IoT device controllers
Machine-to-machine (M2M) communication is hardly a new concept - technologies such as the HART industrial communications protocol have been enabling various forms of M2M communications for decades. Michiyuki Yoneda, Senior Product Marketing Engineer (Programmable Systems Division), Cypress Semiconductor explains.
30th March 2017

Wireless stack improves IoT security

The embedded, wireless stack available from UbiquiOS Technology is now supporting Transport Layer Security (TLS1.2) functionality in a microcontroller-based Secure Element provided by Trusted Objects, allowing developers full featured end-to-end security on IoT devices.
23rd March 2017


Prepare for the unexpected: cyber security pitfalls

Prepare for the unexpected: cyber security pitfalls
In 2016, IBM reported that manufacturing was the second most cyber attacked industry. With new strains of ransomware and other vulnerabilities created every week, what should manufacturers look out for in new year? Here Jonathan Wilkins, Marketing Director of obsolete industrial parts supplier, EU Automation discusses three cyber security pitfalls that industry should prepare for.
9th March 2017

IoT security presentation at embedded world

IoT security presentation at embedded world
Provider of security solutions for IoT and edge devices, Icon Labs, has announced that its President Alan Grau has been selected to present at embedded world. Alan’s presentation will provide engineers, product managers and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secure IoT devices. Engineers developing IoT devices have a wide range of choices for adding security to their device. 
2nd March 2017

Disruptive approach to cyber security testing at MWC

Disruptive approach to cyber security testing at MWC
Unveiling a new, disruptive approach to product cyber security testing, Bureau Veritas are working in partnership with CEA-Leti at the Mobile World Congress in Barcelona, Spain. The company will also launch its new suite of Smart Wear testing solutions for products including Trackers, VR Headsets and Smart Clothing in cooperation with 7layers.
23rd February 2017

Get your head in the cyber security game

Get your head in the cyber security game
MPS believe that skill shortages and a chaotic way of handling personal data breaches is undermining Britain’s ability to deter cyber attacks. Britain is certainly vulnerable to attacks from states like Russia, who do not operate under the same legal standards. And according to a report by the Public Accounts Committee, it said that ministers take too long to consolidate the ‘alphabet soup’ of agencies tasked with keeping the country safe.
3rd February 2017

How better security could fix the 'broken' IoT

How better security could fix the 'broken' IoT
A hot topic in both business and technology circles, the Internet of Things defines a range of technologies that allow us to potentially connect anything electronic with each other in a network of machines, appliance, devices and sensors. However, with news of innovation and opportunity also comes the foreboding side: IoT has a major security problem.
23rd January 2017

DLM service adds Over-the-Air updates to security services

INTEGRITY Security Services (ISS), a Green Hills Software company, has announced the launch of the latest Device Lifecycle Management (DLM) service for secure Over-The-Air (OTA) software updates to network-connected IoT devices in all industries. The DLM OTA Service enables product developers with remote update and management capabilities, providing defence-in-depth protection against defects while continually improving the product in the field.
20th January 2017

75% data recovery time improvement achieved by IT security experts

Britain’s largest collection of independently owned hotels has improved its data recovery time by 75% thanks to a successful partnership with Altinet. The IT experts were called in earlier this year to review IT storage processes and infrastructure for the hotel chain.
19th January 2017


Security documents


Sign up to view our publications

Sign up

Sign up to view our downloads

Sign up

The Security Event 2019
9th April 2019
United Kingdom NEC, Birmingham