2021-07-08 - Nitin Dahad

Intrinsic ID Discusses IoT Security, Technology Scaling, and Quantum Threats

Intrinsic ID CEO Pim Tuyls, talks about PUF security, IoT security challenges as technology scales, and the potential impact of…

2021-06-22 - Ann R. Thryft

SolarWinds Fallout: Are SBOMs the Answer?

A software bill of materials (SBOM) would document third-party software components, including open source and commercial code.

2021-06-16 - Ann R. Thryft

Securing the Software Supply Chain

There's no single solution to make the software supply chain problem go away. It's a process.

2021-05-11 - Ann R. Thryft

Zero-Trust to Address Rising ICS, OT Security Threats

The zero-trust principle, becoming more common in IT networks, is also the best security strategy for OT networks.

2021-04-08 - iWave Systems

iWave Systems Intros Security Suite for NXP i.MX to Secure Connected Devices

iWave Systems' Security suite secures connected devices, enabling them with security functions such as encryption, storage, data transmission and certificate…

2021-03-30 - Geert-Jan Schrijen

Using SRAM PUF for IoT Security

This article covers the basics of what an SRAM PUF (physical unclonable function) is and how it works, as well…

2021-02-19 - Maurizio Di Paolo Emilio

Quantum Physics Promises ‘Unbreakable’ Encryption

QuintessenceLabs derives keys from a quantum source that is truly random, which means they might be legitimately unbreakable...

2021-02-04 - Nitin Dahad

Securing IoT Platform with Multiple RoTs

IoT security platform addresses 'end-to-end security' with provisioning, onboarding and monitoring...

2021-02-02 - India Science Wire

New Security Ink for Protection Bank-Cheques Against Counterfeiting

A group of researchers from the CSIR-NPL has developed a new security ink for bank cheques that is difficult to…

2021-01-29 - Nitin Dahad

Securing Industrial IoT Endpoints at the Chip-Level

Two thing to know about IoT security: First, establish a root of trust (RoT) as a foundation for security, and…