Schneider obtains higher level cybersecurity certification

Schneider Electric has announced a significant milestone with its EcoStruxure IT Network Management Card 3 (NMC3) platform. It has become the first Data Centre Infrastructure Management (DCIM) network card to receive the IEC 62443-4-2 Security Level 2 (SL2) certification from…

Research from BlackBerry QNX highlights growing security concerns

BlackBerry QNX has released new research that reveals the increasing pressure on software engineers and developers to balance swift innovation with the need for robust safety and security. The global survey, which included 1,000 embedded software developers and engineers, with…

Crypto Quantique collaborates with ADLINK to simplify secure boot

Crypto Quantique, a provider of quantum-driven IoT security, has announced a collaboration with ADLINK Technology, aimed at simplifying the secure boot process for industrial PCs (IPCs) via its QuarkLink security platform. Secure boot is essential for ensuring the security and…

Ensuring cyber resilience in the age of connected devices

With reputational, financial and operational implications, Joe Pennisi, President and Chairman, Trusted Computing Group stresses the need for cyber resilience When it comes to attacks, cybercriminals are not only getting smarter, but bolder. Hackers are increasingly taking control of connected…

Westermo attains cybersecurity certification

Westermo is proud to announce it has attained the IEC 62443-4-1 certification, marking a key achievement in its commitment to strengthening cybersecurity within mission-critical networks. The IEC 62443-4-1 standard outlines the requirements for a secure product development lifecycle, ensuring that…

What you need to know about the NIS2 Directive

As the deadline of the NIS2 Directive approaches, Zachary Amos, Editor of ReHack Magazine shares the vital information to know With the rapid growth of IoT technology, cybersecurity is more critical than ever. The risks associated with these devices have…

Protecting critical infrastructure: Q&A with Ashish Khanna

Industry verticals like manufacturing and retail, which have been classified as critical infrastructure, can be especially vulnerable to cyber attacks, IoT Insider learned in a recent conversation with Ashish Khanna, Senior Director at Verizon Business.  “A lot of people are…

Cynomi report cites offering vCISO services as a growth opportunity

Cynomi, a provider of virtual Chief Information Security Officer (vCISO) platforms for managed service providers (MSPs) and managed security service providers (MSSPs), has released its 2024 State of the Virtual CISO report. The findings highlight a significant gap between the…

Unpacking the different cybersecurity laws

Cybersecurity laws reflect one area that governments and regulatory bodies worldwide are grappling with, as the threat landscape evolves, the mindset towards security shifts, and the speed at which solutions are put out to market rapidly gather pace. Historically, IoT…

Getting to grips with secure IoT

What does secure IoT mean to you? Cybersecurity and, more broadly, security as it is understood, has become a major component of the IoT industry. IoT enables connectivity among devices and systems and facilitates unprecedented levels of data collection –…