ETSI publishes white paper on Edge computing security

Members from the ETSI Multi-Access Edge Computing group (ISG MEC) have just published a new white paper: ‘MEC security; Status of standards support and future evolutions‘. The white paper focuses on MEC (multi-access Edge computing) technologies and explores security-related use…

MCU selection guide: what to look for in a microcontroller?

Turn on the datasheet of a microcontroller, usually, you will find more than 300 pages in front of you. It is time-consuming and inefficient to read the pages one after one, hence knowing which specifications are important is very necessary…

Price is more important than security for smart devices say Brits

 BlackBerry Limited has revealed research exposing the cybersecurity risks created by cost-conscious home workers who prioritise security behind price. Despite 77% of smart devices in the home being purchased in the past two years, less than a third (32%) of British home…

Atlas VPN reports: 41% of business cyberattacks are through Cloud servers

Recent changes in IT infrastructure, such as companies’ transition to Cloud solutions – all of which which have been triggered by the rise in remote work – have shifted the focus of cyberattacks. Atlas VPN discusses. According to the data…

Securing industrial automation & control systems

The Industry IoT Consortium (IIC) and the International Society of Automation announced the IoT Security Maturity Model (SMM): 62443 Mappings for Asset Owners, and Product Suppliers, and Service Suppliers. “This new guidance adds the service provider role. It extends the…

IoT security fears fall by over 30%

Fears over security have become less of a concern for organisations adopting IoT solutions than it was five years ago, according to a recent study by Wi-SUN Alliance. The Journey to IoT Maturity, a follow-up to Wi-SUN’s ‘state of the…

Quantum computing’s potential – and its potential concerns

Quantum computing (QC) may prove the next major step in technology, as it even surpasses the value of super computers. Sam Holland looks at QC and considers both the capabilities and the downfalls that may come with it. An introduction…

Crypto Quantique device management service streamlines IoT security lifecycle

Crypto Quantique, a specialist in quantum-driven cyber security for the IoT, has integrated its QuarkLink onboarding and device management technology for IoT devices into the Microchip Trust Platform Suite tool. Adopting QuarkLink means that customers own their Public Key Infrastructure…

The demand for a secure web gateway

The 2021 Global Threat Intelligence Report (GTIR) revealed that there was a 300 per cent increase in cyberattacks during 2020. Reinhard Mayr, Head of Information Security and Research Operations at COPA-DATA explains why a secure Internet gateway is crucial for…

Nebulon adds rapid ransomware recovery to Lenovo ThinkSystem rack servers

Nebulon, Inc. announced 4-minute ransomware recovery on LenovoTM ThinkSystem rack server edge deployments. With this announcement, Nebulon provides enterprises with a Lenovo-based 2-server cluster alternative for their edge data centres with near-instant recovery capabilities. This solution occupies a 33% smaller…