STMicroelectronics brings Certified Solution for Asset Identification & Brand Protection
Introducing new features to secure data exchanges in increasingly aggressive contexts, the STMicroelectronics STSAFE-A110 Secure Element protects consumer and industrial connected devices...
Secure Vault Technology for IoT Device Security
Silicon Labs announces Secure Vault technology, a new suite of state-of-the-art security features designed to help connected device manufacturers address escalating Internet of Things (IoT)...
10 FL Data Tips to Ensure that your EHS Data is Secure
Did you know that many companies don’t have the necessary systems set up to ensure the safety of their EHS data? This...
Matrix 5MP IP Cameras – Higher Resolution for Better Surveillance
With the continued
demand for IP Video Surveillance in Small and Medium-scale Enterprises, new
solutions that produce better image quality in the most challenging...
ASIC Design: Protecting Intellectual Property and Data
Technology
delivers many advances that make our business and personal lives easier, safer
and more enjoyable. However, as we become more reliant on technology...
Top 10 Security Trends to watch out for in 2020
As 2020 begins, rapid transformation of technologies will continue in order to make business practices more productive and efficient. With emerging technologies...
32-Bit MCU for Bluetooth 5.0 with Enhanced Security & Privacy
Renesas Electronics introduced the RX23W – a 32-bit microcontroller (MCU) featuring Bluetooth® 5.0 for IoT endpoint devices such as home appliances and...
Infineon’s 40nm Generation of Security Chip Solutions
Infineon Technologies AG sets another milestone in smart card innovation. Its new 40nm generation of security chip solutions – the SLC3x – is based...
What is SSL, how does it work?
If you run a website or blog, first of all you should make
sure that your website is safe and no one can...
“AuthConductor V2” takes Biometric Authentication to the Next Level
Fujitsu launches sales of the "FUJITSU Security Solution AuthConductor V2" which uses various authentication methods, including palm vein authentication, to deliver comprehensive...