You will likely have heard that this week, Elon Musk bought Twitter for $44bn. Concerns have arisen regarding how he hopes to ‘transform’ the social media platform with free speech. Many critics have speculated that this openly invites hate speech…
European Space Agency selects GTT for hybrid cloud & security services
GTT Communications a global cloud networking provider to multinational clients, has announced that the European Space Agency has renewed and expanded its agreement with GTT for cloud networking services. ESA shares Earth Observation data from its satellites orbiting Earth with institutional…
Third Barcelona Cybersecurity Congress to focus on cyberattack prevention
The third edition of the Barcelona Cybersecurity Congress (BCC), an international event focused on the field of cybersecurity that will take place from May 10 – 12 within the framework of the IOT Solutions World Congress (IOTSWC), will address the…
White-Box encryption protection for payment applications
Banks, payment service providers (PSPs), schemes, and other financial institutions can now benefit from a uniquely high level of sensitive data protection and application attack resistance, following the launch of White-Box Works, a next-generation EMVCo-evaluated White-Box code generator, from PACE…
Cybersecurity lifecycle management platform for connected objects
Secure-IC has been providing the electronic industries, for over a decade, with its protection technologies, namely the SecuryzrTM iSE (integrated Secure Elements) and Silicon IPs which are embedded into hundreds of millions of electronic chips for smartphones, computers, automobiles, smart…
What could the iSIM do for your IoT rollout? – HWP MAX 21 seminar
IoT architects of today have a challenge of ensuring that their connected solutions strategy shows business outcomes right away from first deployment to full commercial rollout. Robust IoT security from device identity to services that rely on end-to-end security will…
How are assets connected to the IoT kept secure?
IoT endpoints and gateways are perennial targets for hackers. Any connected device can expect to be attacked at some time in its life. Surveys suggest that probing will start looking for vulnerabilities only minutes after a new device first goes…