How To Meet The IoT Security Requirements Of Today And Tomorrow


Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a r... » read more

2023 Open Source Security And Risk Analysis Report


The annual “Open Source Security and Risk Analysis” (OSSRA) report, now in its 8th edition, examines vulnerabilities and license conflicts found in roughly 1,700 codebases across 17 industries. The report offers recommendations for security, legal, risk, and development teams to better understand the security and risk landscape accompanying open source development and use. Click here to ... » read more

Securing Next-Gen 5G And IoT With Defensics Fuzzing


Expansion of the IoT brings new security challenges The evolution of 5G technologies continues to drive advancement in Internet of Things (IoT) devices and their applications. By 2025, experts predict there will be nearly 4 billion IoT mobile connections in the world, and more than 64 billion IoT devices by 2026. In addition to enabling superior performance and efficiency, 5G expands the ... » read more

Expansion Of The IoT Brings New Security Challenges


The evolution of 5G technologies continues to drive advancement in Internet of Things (IoT) devices and their applications. By 2025, experts predict there will be nearly 4 billion IoT mobile connections in the world, and more than 64 billion IoT devices by 2026. In addition to enabling superior performance and efficiency, 5G expands the attack surface of applications and devices that run on ... » read more

Preventing A $500 Attack Destroying Your IoT Devices


Internet of Things (IoT) smart devices numbering in the billions and connected via the internet are increasingly vital to society and the global economy. However, the very “connectedness” that makes IoT devices so valuable can be turned to an enormous liability if these devices are left unprotected from security-related threats. This paper explores the threat environment faced by, and the c... » read more

Securing Connected Medical Devices For FDA Submissions


The benefits and challenges of the Internet of Things (IoT) are especially evident in healthcare, thanks to increases in the volume and use of medical devices. Network-connected devices have greatly improved patient care by helping healthcare providers monitor vital signs, regulate medication dosages, improve diagnostics, and ultimately improve patient outcomes while lowering costs. This whi... » read more

Creating IoT Devices That Will Remain Secure


What’s secure today may not be secure in the future, and even if you include an IoT device with state-of-the-art security, it may be surrounded by less secure devices. Steve Hanna, distinguished engineer at Infineon, examines the impact of security on IoT adoption, why resilience across a system is the new target for secure designs, and how to minimize the impact of less secure devices. » read more

Probe assisted localized doping of aluminum into silicon substrates


Abstract "This paper discusses the development of a rapid, large-scale integration of deterministic dopant placement technique for encoding information in physical structures at the nanoscale. The doped structures inherit identical and customizable radiofrequency (RF) electronic signature, which could be leveraged into an identification feature unique to the tag item. This will allow any manuf... » read more

Building A Secured Internet Of Things


The emerging Internet of Things (IoT) presents tremendous opportunities for innovative companies to deliver products and services to make industry more efficient, transportation safer and the everyday lives of people more convenient and fulfilling. But with great good there also can be great risk. Remote, intelligent monitoring and control for factories, homes, cities, and cars can increase eff... » read more

Securing The IoT Begins With Zero-Touch Provisioning At Scale


The path to secured IoT deployments starts with a hardware root-of-trust at the device level, a simple concept that belies the complexity of managing a chain of trust that extends from every edge device to the core of the network. The solution to this management challenge, based on a coordinated effort of domain experts, is a zero touch “chip-to-cloud” provisioning service for certificates-... » read more

← Older posts