2021-09-27 - Ann R. Thryft

SolarWinds Fallout: Cloud Security is the Weak Link

Misconfigurations and the resulting security vulnerabilities are soaring as companies rush to the cloud.

2021-08-31 - Ann R. Thryft

Vulnerability Disclosure Programs Need to Get Organized

Vulnerabilities that create potential security holes in Internet of things (IoT) and industrial control system (ICS) products just keep growing.…

2021-07-08 - Nitin Dahad

Intrinsic ID Discusses IoT Security, Technology Scaling, and Quantum Threats

Intrinsic ID CEO Pim Tuyls, talks about PUF security, IoT security challenges as technology scales, and the potential impact of…

2021-06-22 - Ann R. Thryft

SolarWinds Fallout: Are SBOMs the Answer?

A software bill of materials (SBOM) would document third-party software components, including open source and commercial code.

2021-06-16 - Ann R. Thryft

Securing the Software Supply Chain

There's no single solution to make the software supply chain problem go away. It's a process.

2021-05-11 - Ann R. Thryft

Zero-Trust to Address Rising ICS, OT Security Threats

The zero-trust principle, becoming more common in IT networks, is also the best security strategy for OT networks.

2021-04-08 - iWave Systems

iWave Systems Intros Security Suite for NXP i.MX to Secure Connected Devices

iWave Systems' Security suite secures connected devices, enabling them with security functions such as encryption, storage, data transmission and certificate…

2021-03-30 - Geert-Jan Schrijen

Using SRAM PUF for IoT Security

This article covers the basics of what an SRAM PUF (physical unclonable function) is and how it works, as well…

2021-02-19 - Maurizio Di Paolo Emilio

Quantum Physics Promises ‘Unbreakable’ Encryption

QuintessenceLabs derives keys from a quantum source that is truly random, which means they might be legitimately unbreakable...

2021-02-04 - Nitin Dahad

Securing IoT Platform with Multiple RoTs

IoT security platform addresses 'end-to-end security' with provisioning, onboarding and monitoring...