Securing systems: Four top tips for design engineers
Scott Best, Technical Director of Anti-Counterfeiting Products, Rambus, explains the role of cryptographic ICs. As system counterfeiting attacks continue to send shockwaves across industries, design engineers are evaluating how best to deploy cryptographic authentication integrated circuits (ICs) to secure systems. While there is no shortage of options available, in reality many of these solutions provide very poor levels of additional secur...
Future impacts of AI on cyber crime
Dave Palmer, Director of Technology at Dark Trace, an AI company that specialises in products and systems that can automatically recognise the signs of a cyber attack and interrupt them before a crisis occurs, recently hosted a session at the IoT Expo event in London, where he addressed some of the sensational headlines around how AI is going to supercharge cyber crime.
The worst data breaches of 2018
In 2018 the world has experienced the worst data breaches in major businesses. This unplanned or unintended discharge of confidential information to unauthorised parties has left the global business community in shock and loss.
IoT security and privacy: Three questions to consider
There are many questions these days surrounding IoT security and privacy, as well as to the internet overall. When we ask ourselves whether it will all be secure, the honest answer might be ‘it depends’, in the same way that life and the internet are never really fully secure. The same thing goes with privacy. By Cees Links, GM of Qorvo Wireless Connectivity BU
Facing the cyber security challenge
The cyber security landscape is changing and there are a number of challenges emerging for industry and businesses, particularly from an IoT perspective. Speaking at the Drives & Controls show in Birmingham, Andrew Johnston, a cyber security specialist with Cisco, highlighted the concerns.
Design security into your code. Don’t just hope for the best
If someone constructed a suspension bridge by guessing the steel cabling sizes required and then loading the deck to see whether it collapsed, you would be unlikely to suggest that he was a great civil engineer. And if a lift manufacturer sized their motors by trying them to see whether they caught fire, you wouldn’t expect their electrical engineers to win many awards.
Fighting the fakes
Neil Oliver of Accutronics explores the world of counterfeits and looks at algorithmic security as a new method used to erradicate the fakes.