2020-05-28 - Lou Covey

Security challenges in medical research, intensify need to redefine zero trust

Massive reports on attempts to steal and even damage the research on COVID-19 Coronavirus since 2019, have raised concerns about…

2020-05-18 - Kumi Thiruchelvam

Cloud to chip approach is key to driving adoption of IoT security

Think cloud and not only device, and security will then become more an integral part of the IoT industry...

2019-04-18 - Erric Ravi

5 Tips for Secure Online Projects

Of course, you must have a strong password set in place, but there are other steps you can take. How…

2019-01-03 - Robert Cochran, senior engineer, Mind Chasers

New Year’s Resolution: Help Rescue Privacy from the Jaws of Big Tech

Let us make the resolution today, as tech-minded and talented individuals, to work together to turn the tide against Big…

2018-10-16 - Brian Santo

DoD barely understands cybersecurity

The Department of Defense, despite being warned over and over and over again, is only just now beginning to figure…

2018-06-28 - Ransom Stephens

The end of privacy demands transparency

Having surrendered our inalienable right to privacy, we have to insist on transparency or risk losing every other inalienable right.

2018-02-01 - Bonnie Baker

IoT security: hardware vs software

Total connectivity opens the opportunity for unintentional or malicious data corruption and contamination to occur.

2017-11-07 - Steve Evanczuk, Embedded.com

IoT Security: Putting trust in the edge

There's no silver bullet for IoT security, but ARM is offering developers plenty of ammunition for building more secure IoT…

2017-08-16 - Shoei Printing

Digital security turns to Yoctrace to fight fakes

Fuji Xerox's Yoctrace is an object recognition technology that recognises inherent random patterns inadvertently generated on the surface of objects,…