Cyber Security
Keeping medical devices safe from cyber attacks
In the last few years, hospitals and medical facilities have been successfully targeted by cyber crooks looking to exploit or wreak havoc on the healthcare sector and its patients. Emboldened by the industry’s slow progress in adopting technologies that harden medical devices and data systems, criminals have upped their game. By Alan Grau, VP of IoT/Embedded Solutions, Sectigo
LDRA launches Embedded Safety & Security Summit (ESSS) 2020
LDRA, in collaboration with industry partners and associations, has announced the launch of the sixth edition of the Embedded Safety & Security Summit (ESSS) 2020 to be held on 28 July 2020, at Bengaluru, India. This international summit is an initiative that sheds light on the growing significance of implementing safe and secure practices and technologies in embedded systems.
Will 5G and AI heighten cyber security fears?
An overwhelming majority of cyber security and risk management leaders believe that developments in 5G wireless technology will create cyber security challenges for their organisations. Their top three 5G-related concerns are greater risk of attacks on Internet of Things (IoT) networks, a wider attack surface and a lack of security by design in 5G hardware and firmware.
Simplified hardware-based IoT security with pre-provisioned solutions
As the number and types of connected devices proliferates, market fragmentation and security vulnerabilities in the Internet of Things (IoT) have created significant challenges for developers. Hardware-based security is the only way to protect secret keys from physical attacks and remote extraction, but extensive security expertise, development time and costs are required to configure and provision each device.
Stronger cyber security for embedded developers
Wind River has announced the release of its latest version of Wind River Simics. Using virtual platforms that can accurately model actual hardware, Simics allows functional simulation of any size system, from chips to the most complex system of systems, and creates a path for embedded developers to hone their continuous integration/continuous deployment (CI/CD) practices and develop a DevOps culture.
Hardware-based security solutions to protect data and devices
At it-sa, Swissbit AG will present innovative and industrial hardware-based security solutions to protect data and devices for IoT applications. Visit booth #409 in hall 10.0, where Swissbit will be co-exhibiting together with the Cyber-Sicherheitsrat Deutschland e.V., and where you will be able to discover these easy-to-integrate and retrofittable products.
Real-Time AI-based physical intrusion and theft detection service
Xilinx and SK Telecom have announced that SK Telecom has adopted Xilinx Alveo Datacenter Accelerator cards to power a real-time AI-based physical intrusion and theft detection service. SK Telecom’s AI inference accelerator (AIX) implemented on Xilinx Alveo cards provides efficient and accurate physical intrusion detection using deep neural networks.
IT workers unaware of how to defend against a cyber attack
UK businesses are unaware and unprepared when it comes to protecting themselves against cyber-attacks, new research has revealed. A survey of 1,032 IT workers in full or part-time employment, carried out by technology services provider Probrand has revealed that more than one in five (21%) don’t actually know what a ‘cyber-attack’ constitutes.
Next-generation hardware-based cyber security products
UltraSoC has announced next-generation hardware-based cyber security products that can be used to detect, block and record cyber attacks in a broad range of applications, from vehicles and factory robots to consumer devices. These new offerings embed advanced real-time cyber security features in the systems-on-chip (SoCs) that power and control every modern product.
How to play identity like a board game
Hobbies are meant to take us away from the day-to-day of our jobs. They are a way to pursue new knowledge or a new skill. Humans have been playing board games for at least 5,000 years. There are even a few games featured prominently on Egyptian hieroglyphics or etched into the base of Assyrian winged lions so that the sentries could play. Board games not only allow us to enjoy time with friends and family, but they transport us to new places and ...