nCipher Security, the provider of trust, integrity and control for business critical information and applications, announces enhanced remote access to the crypto capabilities delivered by its nShield Connect XC hardware security modules (HSMs).
According to a new report from the IoT analyst firm, Berg Insight, the installed base of smart electricity and gas meters in Europe will grow by 22% in 2018 to reach 151.9 million.
The IoT industry has a vision problem. The public can’t see the benefits as easily as they can picture the downsides.
Device Authority, a provider of Identity and Access Management (IAM) for the Internet of Things (IoT), announced its solution for securing Enterprise Blockchain infrastructure, powered by KeyScaler.
Although the exact numbers of the market potential of IoT varies between various estimates, McKinsey sets it to be between $2.7(€2.19) to $6.2(€5.04) trillion by 2025. It is estimated that the number of connected devices is set to increase approximately five fold, from 27 billion in 2017 to 125 billion by 2030. However, this potential can be leveraged only with a capable workforce.
Yubico, the provider of authentication and encryption hardware devices for the modern web, launched the YubiHSM 2, a new, cost-effective Hardware Security Module (HSM) for servers and IoT gateways. The product delivers the highest levels of security for cryptographic digital key generation,
On May 22nd 2017, the European Union Agency for Network and Information Security (ENISA) issued a position paper raising this very issue of IoT security. Together with major actors of the semiconductor industry (Infineon, NXP, STMicroelectonics), the agency warned of a “market failure” in IoT security so far: it’s important to act now.
Icon Labs, a provider of security solutions for IoT and edge devices, has announced its IoT Certificate management solution supports Infineon Technologies’ OPTIGA™ Trusted Platform Module (TPM).
Poor IoT device security is a growing concern throughout the business world. Thomas Fischer, Threat researcher and Global Security advocate at Digital Guardian outlines six ways IoT product developers and manufacturers can prevent their devices from being turned into a botnet army.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.