2020-04-13 - Ann R. Thryft & Junko Yoshida

Making Data Self-Protective With Embedded Intelligence

Rather than developing security measures against moving targets, Keyavi’s data intelligence technology can make data “self-intelligent, self-protective and self-aware,” by…

2020-04-07 - Junko Yoshida

Securing API to Protect Your Car-Key Apps

There are too many ways to hack the API of a car-key app. CriticalBlue has a solution for that...

2020-03-31 - George Leopold

U.S. Election Integrity Creates Unease

US election infrastructure is antiquated and vulnerable. Can we fix it before the 2020 presidential election?

2020-03-25 - Nitin Dahad and Maurizio Di Paolo Emilio

Securing IoT With PUF Technology

Several chip vendors are implementing physically unclonable functions (PUF) to enable security in IoT devices; we looked at two of…

2020-03-12 - Junko Yoshida

More Apps for ‘Digital’ Car Keys

NXP's “automotive digital key solution” enables smartphones, key fobs and other devices to securely communicate, store, authenticate and share digital…

2020-02-18 - Lou Covey

IoT: We’re Not Keeping up With Security Threats

Building secure IoT devices is not keeping up with the growth of malware. While authentication is a fundamental part of…

2020-02-11 - Ann R. Thryft

Blog: Data Breaches in the Cloud

As data processing, storage, data management and data analytics of IoT/IIoT devices are shifted to the cloud, the need to…

2020-01-15 - Anne-Françoise Pelé

Multi-Finger Authentication for Smartphones

This one- to four-finger authentication capability aims to strengthen security for mobile banking and payments, personal health monitoring, and remote…

2019-11-18 - M. Di Paolo Emilio

Medical Devices Need for Security

Hacking is a perpetual fear, but there's a more prosaic need for safety: preventing device counterfeiting.

2019-11-08 - Lou Covey

Passwords: The Weak Link in Your IoT Network

Poland-based Cyberus Labs is doing something about the problem with passwords.