Week in Review: IoT, Security, Auto


Internet of Things Release 3 is published by oneM2M, the worldwide Internet of Things interoperability standards initiative. The third set of specifications deals with 3GPP interworking, especially as it relates to cellular IoT connectivity, among other features. The release is said to enable seamless interworking with narrowband IoT and LTE-M connectivity through the 3GPP Service Capability E... » read more

The Week in Review: IoT


Finance CyberInt raised $18 million in new funding led by Viola Growth and including existing investors. The company provides cybersecurity detection and response services. CyberInt has offices in Israel, the U.S., the United Kingdom, Singapore, and Panama. San Diego-based Kneron, which provides artificial intelligence technology for edge devices, received $18 million in Series A1 funding l... » read more

The Week in Review: IoT


Cybersecurity Arm this week introduced the Cortex-M35P processor with anti-tampering technology and software isolation. The company also debuted security intellectual property to protect Internet of Things devices from physical cyberattacks and close proximity side-channel attacks. Paul Williamson, Arm’s vice president and general manager of the IoT Device IP line of business, provides more ... » read more

The Week In Review: IoT


M&A ARM Holdings this week announced the acquisition of two firms, Mistbase and NextG-Com, to help bring narrowband Internet of Things technology to its chip designs. In addition, the company announced the development of ARM Cordio-N radios to reduce the complexity of adopting cellular IoT connectivity. Meanwhile, Blu Wireless Technology of the U.K. reported that ARM made an equity investment ... » read more

Incorporating IoT Security At The Design Phase


The U.S. Department of Homeland Security (DHS) has outlined six Strategic Principles for securing the Internet of Things. Perhaps the most important of these principles is the concept of implementing security at the design phase, with the DHS recommending the use of hardware that incorporates security features to strengthen the protection and integrity of a device. This includes leveraging comp... » read more