Surrey leads new £8 million FORT centre for advancing secure networks

The Engineering and Physical Sciences Research Council (EPSRC) announced that Surrey’s 5G/6G Innovation Centre will lead a new £8 million Centre for Doctoral Training in Future Open Secure Networks (FORT). 

Read more

To make Industry 4.0 work, manufacturers need to put cyber-safety first

In less than a decade, Industry 4.0 has gone from a little-understood buzzword to a major part of nearly every modern manufacturer’s operations, one which may be worth USD 165.5 billion by 2026. Today, it seems obvious that high-tech manufacturing requires networked devices, robotics, and constant cyber-physical optimisation, so much so that it’s hard to

Read more

Sonata Software boosts AI adoption with Microsoft Azure integration

Sonata Software in a step to accelerate the adoption of responsible-first AI across enterprises has announced the integration of Sonata Harmoni.AI with Microsoft Azure AI service. This integration complements Sonata’s collaboration with Microsoft Fabric and its position as a Microsoft AI Partner Council member.

Read more

UKA Group adopts telekom’s Business GPT for secure AI integration

The UKA Group has now access to a secure, data protection-compliant tool for generative AI. The project developer for renewable energies is Deutsche Telekom’s first Business GPT customer. The solution offers generative AI and the option of integrating internal company documents. The application is tested for IT security and data protection and hosted on Telekom’s cloud

Read more

Why anomaly detection matters

Security measures are vital to defend and protect IoT devices and solutions, writes Pritam Shiravadekar, the product manager for value added services at Wireless Logic. It is natural to focus resource on prioritising breach prevention – everyone wants to avoid breaches – but companies mustn’t neglect detection. If they do, significant damage could be done

Read more

Success at scale in IoT relies on optimised connectivity, security, lifecycle and compliance

Following on from the interview with Remi de Fouchier, featured on pages 8-9 of this issue of IoT Now, Robin Duke-Woolley, the chief executive of Beecham Research, also interviewed Eva Rudin, the vice president of Mobile Connectivity Solutions at Thales’ Digital Identity and Security Business, to find out more about Thales’ plans for the IoT

Read more

IoT demands greater simplification, more orchestration and the right level of security for each use case

Robin Duke-Woolley, the chief executive of Beecham Research, recently had a video interview with Remi de Fouchier, the vice president of strategy, marketing and innovation at Thales’ Digital Identity and Security Business, which can be viewed here. In the interview, de Fouchier shared his response to the latest trends in IoT and highlighted how Thales

Read more

AI and security: It is complicated but doesn’t need to be

AI is growing in popularity and this trend is only set to continue. This is supported by Gartner which states that approximately 80% of enterprises will have used generative artificial intelligence (GenAI) application programming interfaces (APIs) or models by 2026. However, AI is a broad and ubiquitous term, and, in many instances, it covers a

Read more

Using your own data to mitigate AI privacy issues and improve AI trust

With AI models able to detect patterns and make predictions that would be difficult or impossible for a human to do manually, the potential applications for tools such as ChatGPT across the healthcare, finance and customer service industries are huge.

Read more

Harnessing generative AI: Amdocs unveils CPQ Pro for CSPs

Amdocs has announced Amdocs CPQ Pro, its next-generation configure-price-quote software that empowers communications service providers (CSPs) to deliver advanced enterprise services to businesses of all types. This solution harnesses the power of generative AI capabilities, enabling CSPs to offer highly tailored and efficient services.

Read more

Regulations, cybersecurity and AI concerns dominate enterprise considerations

In an era marked by profound shifts in the landscape, ranging from the cybersecurity complexities of hybrid work environments to the pervasive integration of AI, there’s now a necessity to look ahead and try to anticipate what’s to come, writes David Critchley, the regional director for UK and Ireland at Armis.

Read more

What next for smart meters reliant on 2G/3G networks?

A recent Public Accounts Committee (PAC) report concluded that progress in the UK’s smart meter rollout is “too slow’’, that deadlines for completion have repeatedly moved and not enough has been done to garner public support. It also warned that an estimated seven million communications hubs, which form part of the electricity smart meters, will

Read more

LEGIC and Sensry collaborate for IoT access control innovation

Sensry and LEGIC Identsystems have collaborated to develop the NextGenXDK multi-sensor device. The formula enables quick implementation for various IoT applications that demand secure and managed sensor access, along with end-to-end data security.

Read more

Telenor launches dedicated tracking solutions venture with DyreID

In 2020, Telenor launched Mitt Spor, an IoT-based tracking service that provides a comprehensive overview of your pet’s location. Now, Telenor is separating the business to focus exclusively on tracking services. Collaborating in this venture with DyreID, owned by the Norwegian Veterinary Association.

Read more

CommScope and STMicroelectronics partner for IoT security integration

CommScope and STMicroelectronics have partnered to integrate CommScope’s PKIWorks IoT security platform with ST’s STM32WB microcontroller unit (MCU). This collaboration provides device manufacturers with a comprehensive answer for developing secure IoT devices that comply with the Connectivity Standards Alliance’s Matter standard.

Read more

Are IoT Devices the Achilles Heel of OT Systems?

When implementing cybersecurity measures, IT systems are often the first consideration. Historically, cybercriminals have made IT systems the focus of their attacks in the hopes of hijacking sensitive, private data to hold for ransom or utilise for other nefarious means. Operational technology (OT) systems, on the other hand, have long been considered inherently secure and

Read more