Cyber Security
Software brings military-grade security to Arm SoC-based designs
Secure virtualisation provider, Lynx Software Technologies, has announced the release of LynxSecure 6.0, the latest version of its award-winning Separation Kernel Hypervisor. The company claims that this new version brings LynxSecure to the Arm architecture for the first time, providing military-grade security coupled with highly efficient virtualisation to multi-core Arm SoC-based designs. The initial port for LynxSecure 6.0 will be availab...
Trusted digital services help secure our world
If you take a minute and actually look what the year 2016 brought us it is pretty amazing. It was a year that smart homes and driverless technology really took off, so what next? Well Neil Bosworth, UK Manager, at digital security company Gemalto believes that: “If 2016 was the year that the Internet of Things broke into mainstream consciousness, 2017 will be the one where it starts to prove its worth.”
Duo work together to strengthen LoRaWAN security
In order to strengthen security of LoRaWAN connectivity across the whole IoT ecosystem, G+D Mobile Security and Senet plan to work together. The collaboration between the two companies provides a full integration of G+D Mobile Security’s Key Management System (KMS) with Senet’s global LoRa-based networks. This results in a flexible and secure cloud-based provisioning solution which enables the necessary levels of security required for...
Fingerprint access device provides instant matching results
On 12th October, global provider of leading biometrics and security solutions, Suprema, announced that the company has launched BioEntry P2, a mullion-type fingerprint access control device that offers what the company claims to be highest matching performance, slim design and multi-card reading in a package to provide comprehensive access control features. BioEntry P2 is designed for both enterprise level access control systems and SMB...
Future-proof security solutions on display at ARM TechCon
Provider of quantum-resistant security tools for the IoT, SecureRF will be exhibiting its authentication and data protection solutions for low-resource processors and embedded devices at ARM TechCon 2017 in Santa Clara, CA. The company will also deliver a talk at the ARM Theater on two of its public-key solutions, Ironwood Key Agreement Protocol (Ironwood KAP) and Walnut Digital Signature Algorithm (WalnutDSA), which were selected as finalists fo...
When solar-powered drones meet Arctic glaciers
What better place than the Arctic for testing the new generation of solar-powered aircraft? The Autonomous Systems Laboratory ASL has developed a pioneering solar-powered unmanned aerial vehicle (UAV), AtlantikSolar, capable of flying for multiple days. Glaciologists from ETH Zurich – who use UAVs to monitor glaciers in Greenland – need further endurance to deal with the immensity of the glacial landscape.
WiFi Krack vulnerability shows any wireless tech could be at risk
Following the recent news on the WiFi Krack vulnerability, Richard Edgar, Director of Communications, Imagination Technologies, said: “With 71% of mobile comms flowing over wireless internet, WiFi is now the most significant communications platform around the world. Therefore, when a story like KRACK breaks it is easy to understand why it makes the headlines – the vulnerability could affect millions of people. However, ...
How cellular technology is transforming home security
As conventional anti‑intrusion technologies are giving way to a new generation of advanced smart home ecosystems, it is safe to say the residential security and hybrid home automation market is currently in a state of transformation. ABI predicts a growth rate of almost 500% in this emerging market between 2016 and 2020.
Could the Government’s cyber priorities leave us vulnerable?
A cyber hack is a cyber hack you might say. However, the fact is that although the Government has made all the right noises in its National Cyber Security Strategy 2016-2021, the different consequences of a cyber attack have made the powers that be more fearful of some than others. But are they right to do so?
Offering DDoS mitigation in under ten seconds
The DDoS attack mitigation technology from Imperva has been expanded. The second generation of the technology means faster performance for internet users and introduces a ten second DDoS mitigation Service Level Agreement (SLA) to minimise business disruption in the event of a DDoS attack.