Crypto Quantique collaborates with ADLINK to simplify secure boot

Crypto Quantique, a provider of quantum-driven IoT security, has announced a collaboration with ADLINK Technology, aimed at simplifying the secure boot process for industrial PCs (IPCs) via its QuarkLink security platform. Secure boot is essential for ensuring the security and…

The 10th Annual IoTSF Conference

The IoT Security Foundation (IoTSF) announces the 10th Annual IoT Security Foundation Conference, the event focused on IoT cybersecurity. This event will take place on 23rd October at the IET in London, and the theme for this year’s conference is…

Westermo attains cybersecurity certification

Westermo is proud to announce it has attained the IEC 62443-4-1 certification, marking a key achievement in its commitment to strengthening cybersecurity within mission-critical networks. The IEC 62443-4-1 standard outlines the requirements for a secure product development lifecycle, ensuring that…

Protecting critical infrastructure: Q&A with Ashish Khanna

Industry verticals like manufacturing and retail, which have been classified as critical infrastructure, can be especially vulnerable to cyber attacks, IoT Insider learned in a recent conversation with Ashish Khanna, Senior Director at Verizon Business.  “A lot of people are…

Over the air updates (OTA): best practices for device safety

Over the air (OTA) updates have become an essential component for maintaining device functionality, deploying new features and addressing security vulnerabilities. OTA updates allow manufacturers to manage large-scale IoT networks by updating software remotely which eliminates the requirement for physical…

Cynomi report cites offering vCISO services as a growth opportunity

Cynomi, a provider of virtual Chief Information Security Officer (vCISO) platforms for managed service providers (MSPs) and managed security service providers (MSSPs), has released its 2024 State of the Virtual CISO report. The findings highlight a significant gap between the…

Unpacking the different cybersecurity laws

Cybersecurity laws reflect one area that governments and regulatory bodies worldwide are grappling with, as the threat landscape evolves, the mindset towards security shifts, and the speed at which solutions are put out to market rapidly gather pace. Historically, IoT…

Getting to grips with secure IoT

What does secure IoT mean to you? Cybersecurity and, more broadly, security as it is understood, has become a major component of the IoT industry. IoT enables connectivity among devices and systems and facilitates unprecedented levels of data collection –…

Nozomi solution to give enterprises more arsenal for cyber attacks

Nozomi Networks has announced the release of the Nozomi TI Expansion Pack. This solution, powered by Mandiant Threat Intelligence, offers enhanced capabilities for industrial and enterprise CISOs and their teams, enabling them to better predict, identify, and respond to cyber…

SEALSQ acknowledges IoT data security, uses Swiss data centres

SEALSQ has announced a significant advancement in IoT data security by utilising ultra-secure data centres in Switzerland for the storage and processing of extensive data generated by its sensors and semiconductors. As IoT devices continue to gather critical information across…