Special Report
Quantum Cryptography: A Magic Bullet For The IoT?
Once this can be made to work on a mass deployment scale and the drawbacks are overcome, it might just be the ticket to ride for objects of the IoT/E, CoT.
Top Stories
Supply Chain Corruption
It’s probably more prominent than you think.
IoT Growing Pains
The challenge now is grasping what the Internet of Things will become, what will drive it, and where are the pitfalls.
Malicious Code In The IoT
The Internet of Things is a moving target when it comes to security. That isn’t good.
The Simple Way To Steal Data
Side channel and fault attacks are a low-cost, quick, and relatively easy way to siphon data.
Blogs
Editor in Chief Ed Sperling predicts connected personal medical applications will become the next big business opportunity—and quickly—in Following The Real Money On The IoT.
Technology Editor Ernest Worthman observes that no matter how vast the potential, there are some important variables that could affect profits in ROI On The IoT.
Executive Editor Ann Steffora Mutschler contends that more work needs to be done to strengthen security as it relates to cell phones, but their collective power can be used for good in cryptographic research in Smartphones Show Their Weaknesses.
Rambus’ Craig Rawlings writes that trying to solve security threats with software doesn’t work because the problem is much bigger and more complex in End-To-End Security.
White Papers
How Code Is Embedded
At every state of the manufacturing process, an adversary can maliciously alter the chip.