Week in Review: IoT, Security, Auto


Internet of Things Arm uncorked its first forward-looking CPU roadmap and performance numbers for client computing. The company said it expects to deliver annual performance improvements of more than 15% per year through 2020. The targeted market includes 5G, always-on, always-connected devices. C3 IoT will work with Google Cloud to support artificial intelligence and Internet of Things dep... » read more

Week in Review: IoT, Security, Auto


Deals Arm acquired Treasure Data, which offers a data management service. Financial terms weren’t revealed, although the transaction is reportedly worth $600 million. Joyce Kim, Arm’s chief marketing officer, told reporters that the purchase is “the largest cash deal we’ve done.” Along with the company’s introduction of Mbed Cloud (a device management service) last year and the acq... » read more

Week in Review: IoT, Security, Auto


Automotive Tech Marvell Technology Group opened its automotive electromagnetic compatibility lab in North America. The facility is CISPR 25-qualified and gives the chip company the capability to conduct in-house electrostatic discharge, emission, and immunity testing. Marvell also reported that its 88Q2112 offering received a mark of 100% in conformance testing outlined by the Japan Automotive... » read more

Week in Review: IoT, Security, Auto


Deals SoftBank Corp. reached an agreement with Indonesia’s Link Net to work together on Internet of Things technology. Hidebumi Kitahara of SoftBank said in a statement, “The global mobile industry is now entering the 5G era, with IoT becoming the central focal point of innovation. This partnership with Link Net shows our strong commitment to further boost technology innovation in the glob... » read more

The Week in Review: IoT


Finance CyberInt raised $18 million in new funding led by Viola Growth and including existing investors. The company provides cybersecurity detection and response services. CyberInt has offices in Israel, the U.S., the United Kingdom, Singapore, and Panama. San Diego-based Kneron, which provides artificial intelligence technology for edge devices, received $18 million in Series A1 funding l... » read more

The Week in Review: IoT


Cybersecurity Arm this week introduced the Cortex-M35P processor with anti-tampering technology and software isolation. The company also debuted security intellectual property to protect Internet of Things devices from physical cyberattacks and close proximity side-channel attacks. Paul Williamson, Arm’s vice president and general manager of the IoT Device IP line of business, provides more ... » read more

Playing Catch Up With IoT Security


While the benefits of the Internet of Things (IoT) are clear, security hasn’t managed to keep up with the rapid pace of innovation and deployment. As the U.S. Department of Homeland Security (DHS) recently stated, an unsecured IoT ecosystem introduces real-world risks that include malicious actors manipulating the flow of information to and from network-connected devices or tampering with dev... » read more

The Week In Review: IoT


M&A ARM Holdings this week announced the acquisition of two firms, Mistbase and NextG-Com, to help bring narrowband Internet of Things technology to its chip designs. In addition, the company announced the development of ARM Cordio-N radios to reduce the complexity of adopting cellular IoT connectivity. Meanwhile, Blu Wireless Technology of the U.K. reported that ARM made an equity investment ... » read more

Will 2017 Be The Year Of DDoS?


Forrester Research sees a rough year ahead for cyber security. Indeed, targeted espionage, ransomware, denial of service, privacy breaches and more are expected to escalate in 2017. In addition, Forrester Researcher analysts predict that more than 500,000 Internet of Things (IoT) devices will be compromised in 2017. Perhaps not surprisingly, IDC analyst Kevin Lonergan recently warned that Io... » read more

Incorporating IoT Security At The Design Phase


The U.S. Department of Homeland Security (DHS) has outlined six Strategic Principles for securing the Internet of Things. Perhaps the most important of these principles is the concept of implementing security at the design phase, with the DHS recommending the use of hardware that incorporates security features to strengthen the protection and integrity of a device. This includes leveraging comp... » read more

← Older posts Newer posts →