The rise of network softwarization and cloud has encouraged a more diverse supply chain and consequently, the zero-trust approach is discussed as a possible way to address the cybersecurity risks that comes with it.
Generating encryption keys using quantum mechanics is a major part of the solving the IoT security challenge. This can harness the true unpredictability of quantum mechanics to produce encryption keys that are near-perfectly unpredictable and protected from adversaries.
With the Device Authority announcing its support for FIDO device onboarding in its IoT identity access management platform, we take a closer look at FDO.
The new Quantum Origin platform uses the unpredictable nature of quantum mechanics to generate cryptographic keys seeded with verifiable quantum randomness.
Collaboration between Quanergy Systems and Securitas France to enable mobile remote surveillance in locations with limited infrastructure using 3D lidar technology.
Solidifying IoT security standards will mitigate the threat that consumers and their property are exposed to via hacking or cybercrime activities. Earlier this year, the…
More edge IoT devices gives more opportunity for cyberattacks as cybercriminals infiltrate connected systems, and devices built on legacy technology without proper security are soft targets ripe for exploitation.
Disclosures by connected device manufacturers remain low despite a record number of hacks. Internet of Things devices are proliferating in record numbers, exceeded only by…
A look at DevSecOps best practice and use of static application security testing (SAST) as part of the software development lifecycle at Iris ID, who provide iris recognition for state-of-the-art access control and sensitive biometric authentication applications.