Security
Setting a global standard for cybersecurity in the IoT
The value of data in an information-driven society makes any connected device a prime target for cyber attacks. Back when devices operated offline or were only accessible physically, over short-range network links, the threat was limited; only devices that were physically accessible were at risk. By Alex Leadbeater, Chair of ETSI Technical Committee CYBER.
Online threats retain high levels as pandemic continues
The COVID-19 pandemic has touched virtually every aspect of human life—from health to housing to economy in general. With uncertainty looming over the future of physical services and remote work on the rise, many businesses and organisations have taken the opportunity to move online and put an extra effort into increasing digital presence. But this decision has been met with multiple challenges, including an ever-increasing number of c...
Secure knowledge for better cyber security
The notion that ideas become reality especially applies to cyber security in critical national infrastructure. Security breaches can result in very real losses of water or energy; but ideas around cyber threats are obscured by misconceptions around the nature of such attacks and how to deal with them. Here Sean Robinson, Service Leader of automation specialist Novotek UK and Ireland, has explained how a compact controller could negate these ...
Answering the cyber security demand in Africa
Cyber Risk Aware has been selected as the security awareness education and phishing simulation solution for Liquid Telecom, a pan-African telecommunications group, within its newly unveiled Cyber Security unit.
Fujitsu develops technology to block facial authentication fraud
Fujitsu Laboratories has announced the development of a facial recognition technology that uses conventional cameras to successfully identify efforts to spoof authentication systems. This includes impersonation attempts in which a person presents a printed photograph or an image from the internet to a camera.
How GOV.UK will verify new influx of benefit applicants with selfies
Mitek and Digidentity, a digital identity verification solutions provider in Europe, have securely scaled operations to enable faster onboarding of those registering with GOV.UK Verify. Working together, Mitek and Digidentity ensured processing speeds of up to 400 applicants per minute to accommodate the growing need for UK nationals and residents to apply for government services, including Universal Credit, during the pandemic.
Defending the IIoT
By creating a world in which physical objects seamlessly integrate into the information network, transferring data between themselves and the cloud, the IIoT is transforming everything from wind turbines and factory automation to critical infrastructure. However, with this smart, connected world comes an increased and very real threat of cyber attacks. Josef Haid of Infineon Technologies explains.
The anatomy of security microcontrollers for IoT
At a time when implementing security in embedded designs seems an overwhelming task, microcontrollers (MCUs) specialising in security features are coming forward to enable security at the inception of the embedded design. That’s a good thing, because there’s no question that a new breed of embedded solutions is needed to secure the Internet of Things (IoT) applications. Rolf Horn, Applications Engineer at Digi-Key Electronics, explain...
Paessler and Flowmon deliver security for IT networks
Paessler has announced an alliance with global network intelligence company, Flowmon Networks to offer more extensive IT monitoring and security for IT networks combined with in-depth analysis. IT monitoring specialist Paessler and Flowmon Networks have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. The integration ensures availability, performanc...
3D printing poses a growing threat to people’s privacy
3D printing technology poses a 'grave and growing threat' to individual privacy because of the potential for products to reveal private information about individuals, experts have warned. People could use cameras, laptops or mobile phones to track and trace the origins of 3D printed objects and how they have been used if they have watermarks.