Develco participates in product inspection accreditation

Develco Products, a provider of white label IoT platforms and IoT products, is proud to announce its role in securing the world’s first product inspection accreditation for IoT cybersecurity. The Alexandra Institute, a technological research and service institute in Denmark,…

US Cyber Trust Mark seen as adding another layer of security

Iain Davidson, Senior Product Manager at Wireless Logic called the US Cyber Trust Mark a “timely addition to the growing body of regulations aimed at enhancing the security of connected devices”, while warning vigilance from device manufacturers as legislative shifts…

Eseye stresses importance of following PSTI Act

Eseye has brought to light the significant implications of the recent Product Security and Telecommunications Infrastructure (PSTI) Act and Regulations, which came into force on 29 April 2024. As the first IoT connectivity provider accredited as a certifying body under…

Q&A: Chris Jones, Crypto Quantique, warns preparation ahead of CRA

The EU Cyber Resilience Act (CRA) is coming hard and companies need to be prepared, warned Chris Jones, Director of Applications at Crypto Quantique in his talk at Hardware Pioneers. In this part three of interviews highlighting experts present at…

Crypto Quantique, ZARIOT and Kigen all partner

Crypto Quantique, a provider of quantum-driven security for IoT, and ZARIOT, a cellular IoT connectivity provider, have collaborated with eSIM vendor, Kigen. This global alliance employs IoT-SAFE to utilise the Hardware Root-of-Trust of any SIM, incorporating quantum-safe technology for the…

4 tips to strengthen security of remote patient monitoring devices

In this exclusive piece, Zachary Amos, Editor of ReHack Magazine, shares his four tips for strengthening remote patient monitoring IoT devices The Internet of Things (IoT) has transformed monitoring, enabling medical providers to keep tabs on patients from afar. While…

How security vetted teams drive excellence

Matt Lee, Chief Delivery Officer at Amdaris discusses how security vetted teams are crucial to ensuring tech excellence The notion of vetting often triggers thoughts of getting tapped on the shoulder by the secret service and undergoing extensive training and…

Hardware Pioneers 2024 stresses collaboration and communication

Collaboration and communication were two major talking points at the latest edition of Hardware Pioneers, as the challenges the industry faces – ranging from complying with the latest regulation to issues in cellular IoT connectivity – requires close collaboration and…

8 ways to fix employee bad habits and boost security

The most significant threat to the security and integrity of networked systems and data does not stem from external hackers or cyberattacks. Instead, the primary vulnerability lies within your organisation itself, specifically from employees prone to making poor decisions when…

Securing the future: Embedded security vs cybersecurity in IoT devices

As the Internet of Things (IoT) continues to expand, the focus on securing these devices has shifted significantly. Traditional cybersecurity, which typically protects networks and data from attacks, must now extend into the very fabric of IoT devices through embedded…