2020-07-30 - Colin Barnden

Blog: Elon’s Too S3XY for Earth

Elon is a comedian. How else could you describe the CEO of an automaker whose model line-up spells “S3XY,” or…

2020-07-20 - Ann R. Thryft

Cloud Cybersecurity for Remote Working In The New Normal

What kind of cybersecurity is needed in the post-coronavirus new normal of distributed hybrid cloud and multi-cloud environments, where remote…

2020-07-13 - STMicroelectronics

Advanced Biometric Payment Card Solution for the Banking Market

STMicroelectronics teamed with Fingerprint to develop an advanced Biometric System-on-Card (BSoC) solution based on fingerprint-recognition technology...

2020-06-08 - Nitin Dahad

What’s the Cost of Privacy?

Given a choice between life and privacy, I’d take life.

2020-06-02 - Russell James

Blog: Do We Have AI Clarity Now?

With several ‘AI winters’ since the late 1960s, do we have greater clarity on AI and its potential or is…

2020-04-30 - Ann R. Thryft

Stay Cyber-Secure Working From Home Amid Covid-19

A huge increase in cyberthreats spawned by the coronavirus pandemic — combined with mass remote working and many others idled…

2020-04-13 - Ann R. Thryft & Junko Yoshida

Making Data Self-Protective With Embedded Intelligence

Rather than developing security measures against moving targets, Keyavi’s data intelligence technology can make data “self-intelligent, self-protective and self-aware,” by…

2020-04-07 - Junko Yoshida

Securing API to Protect Your Car-Key Apps

There are too many ways to hack the API of a car-key app. CriticalBlue has a solution for that...

2020-03-31 - George Leopold

U.S. Election Integrity Creates Unease

US election infrastructure is antiquated and vulnerable. Can we fix it before the 2020 presidential election?

2020-03-25 - Nitin Dahad and Maurizio Di Paolo Emilio

Securing IoT With PUF Technology

Several chip vendors are implementing physically unclonable functions (PUF) to enable security in IoT devices; we looked at two of…