CHERI: revolutionising IoT security with enhanced hardware capabilities

In the rapidly evolving world of IoT, the security of connected devices has emerged as a paramount concern. The joint research project by SRI International and the University of Cambridge, known as CHERI (Capability Hardware Enhanced RISC Instructions), is at…

Experts share how to use cyber hunting as businesses prioritise cybersecurity in 2024

As businesses, including those in the financial sector, prioritise cybersecurity in 2024, they’ll be wondering what they can do to protect themselves against cyber attacks. Cyber hunting allows people to actively spot and search for potential cyber threats within their…

Crypto Quantique’s approach to quantum-enhanced IoT security

In the fast-evolving landscape of the Internet of Things (IoT), security remains a paramount concern. With the proliferation of connected devices, the vulnerability to cyber threats has escalated, prompting a need for more robust and advanced security solutions. Enter Crypto…

Report uncovers new evidence on the cyberattacks on Denmark’s energy sector

Forescout has recently revealed new insights in its report titled “Clearing the Fog of War“, shedding light on cyberattacks that targeted the Danish energy sector in May 2023. This analysis, conducted by Forescout Research – Vedere Labs, challenges the previously…

Trust Stamp and Scurid join to integrate biometrics into IIoT devices

Trust Stamp has formed a strategic alliance with Scurid to integrate biometric technology into IoT devices. This collaboration aims to tackle security issues and enhance authentication and authorisation, creating a more integrated connection between users and devices, according to the…

Reltime secure funding for PoA 5G Node Blockchain project

Reltime announced that it has received a significant funding approval from the Research Council of Norway. This endorsement and financial support have been received for Reltime’s ground-breaking three-year development initiative on “Using 5G Mobile Handsets as node validators in Reltime’s…

ProvenRun secure €15m in boost to security-by-design sector for IoT

ProvenRun recently announced the completion of a €15 million investment round. The company provides operating systems (OS) and applications designed for security in smart devices and connected vehicles. Their primary product, ProvenCore, is notable for being one of the few…

Cybersecurity researchers uncover P2PInfect malware variant targetting IoT devices

Cybersecurity experts at Cado Security Labs have recently identified a new version of the P2PInfect botnet, which presents an increased threat by focusing on IoT devices. This new variant of P2PInfect, built for the MIPS (Microprocessor without Interlocked Pipelined Stages)…

The whats, whys, and how-tos of Device Lifecycle Management

As the perennial question of security in IoT remains inconclusively answered, Device Lifecycle Management (DLM) has emerged as a critical discipline. Although just a string in the bow of complete cybersecurity strategy, DLM encompasses a holistic approach to managing a…

Will quantum cryptography soon be essential for IoT security?

As connectivity continues to expand and the number of devices on a network with it, IoT’s ambition of creating a world of connected things grows. Yet, with pros, comes the cons, and the flip side of this is the growing…