Policing the internet

You will likely have heard that this week, Elon Musk bought Twitter for $44bn. Concerns have arisen regarding how he hopes to ‘transform’ the social media platform with free speech. Many critics have speculated that this openly invites hate speech…

European Space Agency selects GTT for hybrid cloud & security services

GTT Communications a global cloud networking provider to multinational clients, has announced that the European Space Agency has renewed and expanded its agreement with GTT for cloud networking services. ESA shares Earth Observation data from its satellites orbiting Earth with institutional…

How the security mechanism of microcontrollers secure IoT devices

The coming of IoT era brings a huge amount of data in the cloud and edge. With the growth of cloud-based information, Statista has expected more than seven million data centres in 2021 and Global Market Insights has projected $45bn…

Third Barcelona Cybersecurity Congress to focus on cyberattack prevention

The third edition of the Barcelona Cybersecurity Congress (BCC), an international event focused on the field of cybersecurity that will take place from May 10 – 12 within the framework of the IOT Solutions World Congress (IOTSWC), will address the…

Anonymous’s cyber attacks against Russia

As the invasion of Ukraine continues in Russia, there have been frequent reports of companies removing their services to Russian users and consumers to show their resistance to Vladimir Putin’s attacks on Ukraine. But another major form of anti-Russia, Pro-Ukraine…

White-Box encryption protection for payment applications

Banks, payment service providers (PSPs), schemes, and other financial institutions can now benefit from a uniquely high level of sensitive data protection and application attack resistance, following the launch of White-Box Works, a next-generation EMVCo-evaluated White-Box code generator, from PACE…

Cybersecurity lifecycle management platform for connected objects

Secure-IC has been providing the electronic industries, for over a decade, with its protection technologies, namely the SecuryzrTM iSE (integrated Secure Elements) and Silicon IPs which are embedded into hundreds of millions of electronic chips for smartphones, computers, automobiles, smart…

What could the iSIM do for your IoT rollout? – HWP MAX 21 seminar

IoT architects of today have a challenge of ensuring that their connected solutions strategy shows business outcomes right away from first deployment to full commercial rollout. Robust IoT security from device identity to services that rely on end-to-end security will…

How are assets connected to the IoT kept secure?

IoT endpoints and gateways are perennial targets for hackers. Any connected device can expect to be attacked at some time in its life. Surveys suggest that probing will start looking for vulnerabilities only minutes after a new device first goes…

Modernising the manufacturing industrial network in 2022

The manufacturing industry has become increasingly connected, allowing the sector to enjoy benefits ranging from becoming more agile and competitive in the market, to maximising efficiency, reducing costs, and monetising data. It is clear that implementing smart manufacturing is no…