Silos to Systems Webinar Banner Ad 800x100 (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 328
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 328
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

ARM and Open Silicon Join Forces to Fight the IoT Edge Wars!

ARM and Open Silicon Join Forces to Fight the IoT Edge Wars!
by Mitch Heins on 12-19-2016 at 4:00 pm


I spent the last several days doing a deep dive into the world of IoT security and what I’ve learned has scared the pants off me. Various analysts predict that there will be over 30 billion connected IoT devices by the year 2020 growing from 9.9 million in 2013. A quick audit of my home identified over 40 connected devices including everything… Read More


Top IOT News for 2016

Top IOT News for 2016
by Bill McCabe on 12-18-2016 at 12:00 pm

2016 will go down as being part of the golden era for the Internet of things. This last year has experienced incredible advancements like cars that drive themselves, and cities that actually smarter. It has also been a learning experience where major security breaches threatened us, but we worked past them, and ultimately built… Read More


What Stephen Hawking gets right and wrong about the most dangerous time for our planet

What Stephen Hawking gets right and wrong about the most dangerous time for our planet
by Vivek Wadhwa on 12-15-2016 at 4:00 pm

Stephen Hawking made a bold headline last week: “This is the most dangerous time for our planet.”

In an essay in the Guardian, the renowned theoretical physicist wrote: “Whatever we might think about the decision by the British electorate to reject membership of the European Union and by the American public to embrace Donald Trump… Read More


Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)

Cybercriminals Next Targets: Long Term Prizes (part 2 of 2)
by Matthew Rosenquist on 12-15-2016 at 12:00 pm

AAEAAQAAAAAAAAhUAAAAJGVmZTI3MmI1LTNmMWEtNGFlMi05M2YxLTQ2MzdiMWU0NTE1NQ

In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2), I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging Internet-of-Things (IoT) devices. The longer-term outlook expands their reach to more… Read More


Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)

Cybercriminals Next Targets: Short Term Dangers (part 1 of 2)
by Matthew Rosenquist on 12-14-2016 at 12:00 pm

AAEAAQAAAAAAAAiAAAAAJDkzODVhYTI0LWMwNjctNGVhNC1iYzg5LWNlN2QyNTc2ZTRiNg

Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a glassware shop. The tougher challenge is figuring out where they will take aim tomorrow. Knowing where cyber threats will attack in the future, gives the necessary insights to … Read More


3 Reasons Why is Cybersecurity Losing

3 Reasons Why is Cybersecurity Losing
by Matthew Rosenquist on 12-11-2016 at 12:00 pm

AAEAAQAAAAAAAAiRAAAAJDAxZTg4NTZjLWIxYmItNGI1Zi04NWZmLWQ5ZTI4NjFhMzgxZQ

Cyber threats are currently outpacing the defenders but it does not need to be the case. Attacks are increasing in number and type, with the overall impacts are becoming greater. Cybersecurity is struggling to keep our digital lives and assets protected from the onslaught of attacks but facing great challenges. By understanding… Read More


Hack This? Making Software a Moving Target

Hack This? Making Software a Moving Target
by Bernard Murphy on 12-06-2016 at 4:00 pm

It sometimes seems that the black hats are always one step ahead of the white hats in the never-ending security game. One of the especially invidious ways hackers have found to evade detection is through mutation – changing the code in a virus on each copy, defeating classical signature detection methods and potentially requiring… Read More


How to Secure a SoC while Keeping Area and Power Competitive?

How to Secure a SoC while Keeping Area and Power Competitive?
by Eric Esteve on 11-29-2016 at 7:00 am

I have attended LETI conference last June and remember the paper presented by Alain Merle, their security guru. Alain said that smart cards are secured because up to 50% of the Silicon area is dedicated to security. When you design a SoC to address applications like smart metering, NFC payment or embedded SIM, you know in advance … Read More


The New Reality for IoT Security

The New Reality for IoT Security
by Matthew Rosenquist on 11-28-2016 at 4:00 pm

Recent Distributed Denial of Service (DDoS) attacks are forcing a shift in Internet-of-Things (IoT) security thinking. The dangers are expanding as attackers are taking advantage of billions of IoT devices, conscripting them into their botnet armies for massive DDoS attacks.… Read More


IoT Tech from Iowa

IoT Tech from Iowa
by Bernard Murphy on 11-22-2016 at 7:00 am

When you see Iowa and IoT in a title, you probably think of agricultural applications and Iowa as a consumer. In fact, they have their own pretty active tech development culture especially around Des Moines. Certainly some of this is focused on agtech, but there are also players in fintech, payment tech, health-tech, business automation,… Read More