Cyber Security
Turnkey security solutions highlighted at TRUSTECH 2017
During TRUSTECH 2017 in Cannes, France (28th to 30th November 2017), Maxim Integrated Products demonstrated new turnkey technologies that protect embedded and connected systems from invasive attacks. As cyber attacks continue making headlines, design engineers struggle to safeguard their products while meeting stringent time-to-market and budget constraints. Meanwhile, safety standard certification costs continue to rise. Maxim’s embedded s...
Taking control of the Royal Canadian Navy drone threat
A new service to the Royal Canadian Navy (RCN) has been introduced by QinetiQ Target Systems (QTS). It is emulating the threat posed to large naval vessels by small multi-rotor drones.
Cybersecurity: The importance of protecting data at rest with VxWorks
Cast your minds back a few months ago, Equifax had a data breach that exposed to hackers the names, social security numbers, credit card numbers, driver’s license numbers, and other sensitive personal information which resulted in a total of 145.5 million consumers impacted by this cyber security breach after the forensic investigation concluded. Guest blog written by Ka Kay Achacoso.
You can’t steal a key that isn’t there
The security market and its needs have evolved, and security attacks have become more sophisticated over time. The requirements placed on the market to stay ahead of the hackers has also increased significantly as everything around us has become more connected.
Mobile solutions for friendlier yet secure border control
Across the Member States, border control authorities are hard-pressed to both enforce security and facilitate mobility within the EU. Advanced mobile solutions are slated to help facilitate non-intrusive border crossing for legitimate travellers while guarding against illegal and threatening cross-border activities.
WiFi - the most important communications platform
Richard Edgar, Director of Communications, Ensigma, from Imagination Technologies has commented on the recent news of the WiFi Krack vulnerability.
Calling time on insecure connected toys
In a statement released today, independent consumer body Which? has called for all insecure connected toys to be removed from sale immediately. Which? has expressed its frustration with toy manufacturers that have failed to address vulnerabilities highlighted by researchers, in internet or Bluetooth connected products and believe that enough is enough.
Next-gen UAVs – enter the dragonfly
Working from its Laboratory at Begbroke Science Park, Oxford, the core of the business of Animal Dynamics is to harness a deep understanding of movement in animals to create more efficient and powerful systems capable of performance beyond anything currently found in nature or engineering.
Black Duck acquisition to strengthen Synopsys
Synopsys and Black Duck Software have signed a definitive agreement for Synopsys to acquire privately held Black Duck, provider of automated solutions for securing and managing open source software. The addition of Black Duck's Software Composition Analysis solution will enhance Synopsys' efforts in the software security market by broadening its product offering and expanding its customer reach.
Registrations on the up for youth cyber security competition
Global security company, Northrop Grumman, has launched this year’s CyberCenturion, the UK’s national youth cyber defence competition for 12-18 year olds. A record 575 teams, made up of more 2,500 students, including 116 all-female and 45 cadet teams from across the country have registered to participate, marking a more than threefold increase over last year. This is the fourth consecutive year the CyberCenturion competition has ...