Laptop into sleep mode or hibernate: Convenient? Yes. Secure? No.
For many of us, shutting our laptops after a tough day in the office is a satisfying feeling that signals the end of work...
ST Engineering’s Electronics Sector & SUTD signed MoU to enhance Cybersecurity
ST Engineering’s electronics sector today signed a Memorandum of Understanding with the Singapore University of Technology and Design (SUTD) to co-develop new operational technology...
EEMBC’s SecureMark-TLS focuses on Transport Layer Security protocol for IoT edge nodes ...
EEMBC, an industry consortium that develops benchmarks for embedded hardware and software, announced that its SecureMark -TLS benchmark is now available for licensing. Part...
Synopsys DesignWare Security IP for Drone SoC selected by Artosyn
DesignWare tRoot Hardware Secure Module with Root of Trust protects sensitive information within an SoC
Multi-stage secure boot validates software and data integrity...
Access to Applications Based on a “ Driving License” Model
In today’s dynamic times, more and more countries are modifying their policies with a new “driving license” model. With a classic license model, drivers...
NXP Plug & Trust Secure Element: Ready-to-use security solution for IoT Edge Nodes
Mouser Electronics is now stocking the A71CH secure element from NXP Semiconductors. A ready-to-use security solution for next-generation Internet of Things (IoT) devices, the...
Infineon Open source software stack for TPM 2.0 securing industrial & automotive applications
Infineon Technologies AG has enabled a new open source software stack. It makes work easier for developers who want to use the Trusted Platform...
Industry’s first automotive security development kit to protect in-vehicle networks from hackers
The mass adoption of modern conveniences in automobiles, such as infotainment and Advanced Driver Assistance Systems (ADAS), has greatly enhanced the experience of everyday...
C-SUITE PERSPECTIVES: Trends in Cyberattack Landscape, Security Threats & Business Impacts
C-suite executives understand that to transform their businesses, they must embrace the integration of new technologies. Most rank improvement of information security and business...
How Near Field Communication NFC Top 5 Security Issues will Make You Think twice
The connectivity trivia goes all the way from the pigeons to Wi-Fi, and presently, the Near Field Communication. Is your latest smartphone or Payment...