Cyber Resilience Act approaching enactment: EU sets standards for connected products

The European Commission’s Cyber Resilience Act is on the brink of becoming Europe’s most encompassing cybersecurity legislation for products. Recent amendments have clarified the law’s applicability, and experts view its formal ratification as assured. “From our viewpoint on security analysis,…

The Cyber Scheme launches course for IoT/ICS security testers

The Cyber Scheme has launched a new CSII Practitioner Training Course, specifically designed as a detailed IoT/ICS hacking course. This course aims to equip participants with the necessary skills for conducting secure tests and assessments on connected systems and devices…

Somos introduces IoT identity management service SomosID

Somos has unveiled SomosID. This cutting-edge IoT identity management service stands out for offering a comprehensive registry for IoT asset owners aiming to enhance visibility of their installed assets. As digital transformation accelerates, organisations are increasingly implementing IoT technologies to…

ColorTokens launches capabilities to empower organisations to be breach ready

ColorTokens the leading enterprise microsegmentation company, unveiled significant upgrades to Xshield, its flagship platform. The upgrades include expanded asset protection and a completely reimagined approach to Zero Trust microsegmentation implementation. These advancements reinforce the company’s commitment to providing IT and security leaders with breach-ready…

CHERI: revolutionising IoT security with enhanced hardware capabilities

In the rapidly evolving world of IoT, the security of connected devices has emerged as a paramount concern. The joint research project by SRI International and the University of Cambridge, known as CHERI (Capability Hardware Enhanced RISC Instructions), is at…

Experts share how to use cyber hunting as businesses prioritise cybersecurity in 2024

As businesses, including those in the financial sector, prioritise cybersecurity in 2024, they’ll be wondering what they can do to protect themselves against cyber attacks. Cyber hunting allows people to actively spot and search for potential cyber threats within their…

Crypto Quantique’s approach to quantum-enhanced IoT security

In the fast-evolving landscape of the Internet of Things (IoT), security remains a paramount concern. With the proliferation of connected devices, the vulnerability to cyber threats has escalated, prompting a need for more robust and advanced security solutions. Enter Crypto…

Report uncovers new evidence on the cyberattacks on Denmark’s energy sector

Forescout has recently revealed new insights in its report titled “Clearing the Fog of War“, shedding light on cyberattacks that targeted the Danish energy sector in May 2023. This analysis, conducted by Forescout Research – Vedere Labs, challenges the previously…

Trust Stamp and Scurid join to integrate biometrics into IIoT devices

Trust Stamp has formed a strategic alliance with Scurid to integrate biometric technology into IoT devices. This collaboration aims to tackle security issues and enhance authentication and authorisation, creating a more integrated connection between users and devices, according to the…

Reltime secure funding for PoA 5G Node Blockchain project

Reltime announced that it has received a significant funding approval from the Research Council of Norway. This endorsement and financial support have been received for Reltime’s ground-breaking three-year development initiative on “Using 5G Mobile Handsets as node validators in Reltime’s…