Young workers are the most vulnerable to phishing scams, according to a new global survey on cybersecurity readiness, which also highlights growing anxiety about artificial intelligence–driven attacks. The study, commissioned by Swedish-American security company Yubico and carried out by Talker…
Crypto Quantique announces QRoot Lite
Crypto Quantique has announced a new lightweight root-of-trust (RoT) IP block to enable security feature implementation in resource-constrained microcontrollers and IoT devices. Called QRoot Lite, the implementation complies to the Measurement and Attestation RootS of Trust (MARS) specification developed by…
3 reasons website traffic analysis can help protect your website
As a digital business owner, one of your priorities will be analysing the traffic coming into your website, and monitoring just how successful your online presence is. The more traffic coming in, the clearer it is that your digital marketing…
Encrypted Communication
Würth Elektronik introduces its new Cordelia-I Wi-Fi module, specifically designed for secure IoT and ‘Edge Computing’ applications. This versatile module is ideal for applications in Industry 4.0, smart city / smart home, eMobility, smart agricultural, and medical devices, to name…
Cynomi report cites offering vCISO services as a growth opportunity
Cynomi, a provider of virtual Chief Information Security Officer (vCISO) platforms for managed service providers (MSPs) and managed security service providers (MSSPs), has released its 2024 State of the Virtual CISO report. The findings highlight a significant gap between the…
AWS and IoT: Enabling scalable IoT networks
Building a scalable and secure IoT solution can be challenging, particularly when it comes to managing large volumes of data, ensuring device security and maintaining reliable connectivity. Amazon Web Series (AWS), a Cloud computing platform, looks to address all of…
2N discusses PSTI standards
2N Telecommunications’ access systems, along with its range of products, comply with British safety standards, including the Product Security and Telecommunications Infrastructure (PSTI) Act, which came into effect on 29th April 2024. This legislation introduces enhanced cyber security measures for…
Keysight to participate in Joint Cyber Defense Collaborative
Keysight Technologies has announced its participation in the Joint Cyber Defense Collaborative (JCDC), further strengthening its partnership with the US government to bolster the nation’s cybersecurity resilience. With two decades of experience in cybersecurity testing and threat intelligence research, Keysight…
Genians widens focus to include IoT security
Genians, a provider of NAC-driven Zero Trust Network Access (ZTNA) solutions, is strengthening its commitment to securing the digital future by broadening its global focus to include IoT and critical infrastructure security. As the digital world evolves, the rapid expansion…
Luminys, Foxlink and MediaTek partner on AI-powered security
Luminys Systems, along with its parent company, Foxlink, has announced a strategic partnership with global semiconductor company MediaTek. This collaboration is set to usher in the next generation of AI-driven video security solutions by integrating MediaTek’s state-of-the-art chip technology, Foxlink’s…