Panasonic’ wireless modules conform with new Radio Equipment Directive

Panasonic Industry Europe confirms alignment of its wireless modules with the newly adopted European Radio Equipment Directive (RED) EN 18031-1:2024. From 1st August 2025, all wireless devices placed on the EU market must comply with all RED cybersecurity requirements. This…

From passwords to passkeys: securing connected devices with modern authentication

Connected devices power modern industries, but passwords leave them exposed. Niall McConachie, regional director (UK & Ireland) at Yubico writes that passkeys offer stronger, phishing-resistant authentication, helping manufacturers secure data, meet regulations, and build lasting user trust. The Internet of…

S7: E5: Securing critical infrastructure

In the latest episode of IoT Unplugged, Toby Wilmington, Chief Executive and Co-Founder of Periphery, outlined how his company is tackling one of the most pressing and least visible challenges in cybersecurity: securing the growing web of embedded and connected…

Zenture Partners and Aryaka strike deal to simplify global network management with unified SASE and AI-powered platform

Zenture Partners has teamed up with Aryaka in a move aimed at simplifying how large enterprises manage and procure their global networks, combining Aryaka’s Unified Secure Access Service Edge (SASE) as a Service with Zenture’s AI-powered telecoms lifecycle management platform.…

SOTI unveils retail-focused software upgrades to bolster security and cut downtime

Mobile technology company SOTI has announced a series of upgrades to its enterprise mobility management software, as retailers face mounting pressure to protect customer data and improve operational efficiency. Unveiled at SOTI SYNC 25, the Canadian group’s annual partner and…

US cybersecurity firm Exabeam adds industry benchmarking to threat detection platform

US cybersecurity company Exabeam has launched a new tool that lets chief information security officers compare how well their organisations are protected against cyberattacks with peers in the same industry, region, and size group. The feature, part of Exabeam’s Nova…

US cyber start-up targets industrial blind spots with new machine identity tools

Cybersecurity start-up Corsha has unveiled new capabilities for its machine identity platform, aimed at helping industrial and government organisations manage and secure the growing web of machine-to-machine (M2M) communications. The Washington-based company, which calls itself the first purpose-built Machine Identity…

BYOD culture leaves British organisations exposed to ransomware risks

Cyberattacks against British organisations are being exacerbated by everyday working practices, according to new research from software company Ivanti, which highlights the risks posed by personal devices, insecure Edge equipment, and slow adoption of advanced security controls. The report, Securing…

India’s Evolute secures biometric approval as NEXT eyes growth in digital ID market

Indian Point-of-Sale device maker Evolute has obtained approval to connect its machines to Aadhaar — India’s vast digital identity system covering more than 1.4bn people — after securing mandatory L1 certification with the support of Norway’s NEXT Biometrics. Aadhaar provides…

Gen Z emerges as prime target for phishing scams, Yubico warns

Young workers are the most vulnerable to phishing scams, according to a new global survey on cybersecurity readiness, which also highlights growing anxiety about artificial intelligence–driven attacks. The study, commissioned by Swedish-American security company Yubico and carried out by Talker…