Nozomi Networks, a provider of OT and IoT security, has unveiled the industry’s first OT and IoT security sensor embedded within Mitsubishi Electric programmable logic controllers (PLCs). The introduction of Arc Embedded grants security and operations teams unprecedented visibility at…
Silicon Labs opens registration for conference
Silicon Labs recently announced the opening of registration for its fifth annual Works With Conference. New for 2024, this year’s event will feature three regional, in-person gatherings: In its fifth edition, the Silicon Labs Works With Developers Conference is going…
ENGIE Vianeo partners with BICS to integrate IoT into EV chargers
ENGIE Vianeo, the electric vehicle (EV) charging division of energy firm ENGIE Group, has joined forces with international communications provider BICS to integrate its charging stations into the Internet of Things (IoT). This collaboration will enable real-time data collection, facilitating…
DigiCert introduces solution for IoT device security
DigiCert has announced the advancement of its IoT security offering with the introduction of DigiCert Device Trust Manager. This new solution is designed to protect IoT devices throughout their entire lifecycle. Device Trust Manager meets the critical needs of device…
Würth Elektronik partners with Crypto Quantique for IoT Security
Würth Elektronik has signed a partnership agreement with Crypto Quantique. Collaboration with the specialist in quantum-based cyber security in IoT enhances security for Würth Elektronik’s wireless modules. Würth Elektronik boasts a broad portfolio of modules for wireless communication and sensors…
u-blox LTE-M module fully certified in Japan
u-blox has announced the certification of its SARA-R5 series on all the Japan MNOs’ LTE-M networks. The modules are based on u‑blox’s own low-power wide-area (LPWA) chipset (UBX-R5) and are the first u-blox IoT products to achieve certification with all…
Digital Security by Design: a revolution in the cybersecurity landscape
Since the 1970s, there has been an ongoing challenge regarding the security of computer systems: fast forward to the present the underpinning memory access architecture remains unchanged despite well-documented vulnerabilities and flaws. The results speak for themselves: 300 million+ of devices…