Members from the ETSI Multi-Access Edge Computing group (ISG MEC) have just published a new white paper: ‘MEC security; Status of standards support and future evolutions‘. The white paper focuses on MEC (multi-access Edge computing) technologies and explores security-related use…
MCU selection guide: what to look for in a microcontroller?
Turn on the datasheet of a microcontroller, usually, you will find more than 300 pages in front of you. It is time-consuming and inefficient to read the pages one after one, hence knowing which specifications are important is very necessary…
Securing industrial automation & control systems
The Industry IoT Consortium (IIC) and the International Society of Automation announced the IoT Security Maturity Model (SMM): 62443 Mappings for Asset Owners, and Product Suppliers, and Service Suppliers. “This new guidance adds the service provider role. It extends the…
Crypto Quantique device management service streamlines IoT security lifecycle
Crypto Quantique, a specialist in quantum-driven cyber security for the IoT, has integrated its QuarkLink onboarding and device management technology for IoT devices into the Microchip Trust Platform Suite tool. Adopting QuarkLink means that customers own their Public Key Infrastructure…
Nebulon adds rapid ransomware recovery to Lenovo ThinkSystem rack servers
Nebulon, Inc. announced 4-minute ransomware recovery on LenovoTM ThinkSystem rack server edge deployments. With this announcement, Nebulon provides enterprises with a Lenovo-based 2-server cluster alternative for their edge data centres with near-instant recovery capabilities. This solution occupies a 33% smaller…