Special Report
Security Risk Escalating In 2015
A look at the current state of security and how it is likely to change.
Top Stories
What’s Really Inside?
Concern is growing that devices of all types, including military hardware, may contain extra circuits or malicious code.
Smart Grids, Smart Cities
Today’s smart grids will power the smart cities of tomorrow, but how secure will they be?
Red Tape And Health Care Security
Why the medical sector cannot keep pace with data breaches.
Biometrics For The IoT
Second of two parts: What works, what doesn’t, and why Gummy Bears can be used to fool advanced security technology.
Blogs
Editor In Chief Ed Sperling notes that no one is questioning the value of connecting everything anymore, in IoT One Year Later.
Technology Editor Ernest Worthman contends that if someone can create a secure system, it’s probable that someone else can hack it, in Conspiracy Theory.
Oracle’s Rodrigo Liang argues that Big Data will need to migrate to large on-chip SRAMs from DRAM, in Big Data Needs Bigger Memory.
Rambus’ Simon Blake-Wilson observes that a century after the first known “gray hat” stunt, experts are still baffled, in The Challenges Of IoT Security.
Andes Technology’s Emerson Hsiao finds that choosing the right embedded processor can cut cost, power and increase security on a grand scale, in Smarter Meters.
Executive Editor Ann Steffora Mutschler questions whether the IoT will live up to expectations, in STEM And The IoT.
Whitepapers
A Low-Cost, Low Power Memory Solution For IoT Devices
Why antifuse technology is the best choice for MCUs and one-time programmable memory.
Round-Trip Engineering Key To AUTOSAR-Based Development
How to keep intermediate results involving AUTOSAR artifacts consistent when they are exchanged between different tools.