Hardware Pioneers 2024 stresses collaboration and communication

Collaboration and communication were two major talking points at the latest edition of Hardware Pioneers, as the challenges the industry faces – ranging from complying with the latest regulation to issues in cellular IoT connectivity – requires close collaboration and…

8 ways to fix employee bad habits and boost security

The most significant threat to the security and integrity of networked systems and data does not stem from external hackers or cyberattacks. Instead, the primary vulnerability lies within your organisation itself, specifically from employees prone to making poor decisions when…

Securing the future: Embedded security vs cybersecurity in IoT devices

As the Internet of Things (IoT) continues to expand, the focus on securing these devices has shifted significantly. Traditional cybersecurity, which typically protects networks and data from attacks, must now extend into the very fabric of IoT devices through embedded…

Tenable report shows Cloud security is lacking

Recently, Tenable, the Exposure Management company, released its latest Cloud security report titled “2024 Cloud Security Outlook: Navigating Barriers and Setting Priorities”. The report reveals that most IT managers (97%) plan to expand their Cloud environments in the coming year.…

qomodo raises £1.3m in using IoT to protect against cyber threats

qomodo, the Internet of Things (IoT) cybersecurity company, has announced the successful raising of £1.3 million in a pre-seed funding round led by Expeditions Fund, with participation from Amadeus Capital Partners, Auriga Cyber Ventures, Nio Advisors, McNally Capital, Ventures Together,…

How to secure IoT devices against growing cyber attacks

The IoT industry and cybersecurity have long been bedfellows, discussed in the same capacity as the growing number of IoT devices have meant the surface area for which cyber criminals can target has increased, too. Notably not a new topic…

Bridewell study highlights fears around AI-powered cyber attacks

A recent study by Bridewell, a cyber security services firm, indicates that 76% of the UK’s critical national infrastructure (CNI) organisations have pinpointed the utilisation of AI in fostering cyber threats as a pressing security issue. This notable rise in…

Cryptomathic introduces latest cryptographic key solution

Cryptomathic recently introduced CrystalKey 360, its latest cryptographic key management solution. According to recent insights from Gartner, the evolving regulatory landscape is driving security and risk management leaders to increase their spending in these areas. As the number of cryptographic…

Cato Networks shows insecure network protocols persist

Cato Networks recently released its inaugural Cato CTRL SASE Threat Report for Q1 2024. The report reveals that all surveyed organisations persist in using insecure protocols across their wide access networks (WAN), making it easier for cybercriminals to move across…

ONEKEY submits patent for “Compliance Wizard” following CRA

In March 2024, the European Parliament ratified the Cyber Resilience Act (CRA), which is set to be published in the upcoming weeks, marking the commencement of the transition period. “Companies should immediately assess how the requirements of the CRA will…