With security becoming an increasingly important aspect to product design, Infineon have announced that they will be including Semper Security into their NOR Flash memory. What is Semper Security, and how is the inclusion of Semper into NOR Flash memory demons...
By Robin Mitchell | 13-07-2020
The Internet of Things (IoT) continues to rise in popularity. Now, it seems almost anything boasts Internet connectivity, from single-board computers, mobile devices, and TVs to fridges. Outside of consumer IoT, industrial IoT is incredibly prevalent. Plus, ev...
By Moe Long | 11-11-2019
Introduction Presence detectors specially designed for buildings with a large coverage area are a new security and safety feature that is rapidly becoming a part of the security marketplace. A presence detector monitors the detection zone for occupancy. If a p...
By Nnamdi Anyadike | 02-09-2019
Information Technology departments are usually on the ball when it comes to traditional threats. Bad passwords, viruses, and website whitelists are all par for the course. Managing portable assets (phones, tablets, USB flash memory, etc.) is also a key element...
By Christian Cawley | 14-05-2019
Wireless security cameras are rapidly becoming more sophisticated with the latest models now equipped with motion detection sensors and the ability to record footage of an intruder. More advanced cameras include facial recognition and two-way audio. But regard...
By Nnamdi Anyadike | 14-01-2019
Public cloud computing and storage services are rapidly becoming the norm and overtaking the alternative strategy where companies build their own private cloud. Will this open more doors through which cybercriminals can infiltrate company networks? This questi...
By Paul Whytock | 16-04-2018
Cyber security and the stealing of personal data is big news these days and so its not surprising that I receive a regular stream of press releases from expert companies expounding their theories on how to keep data secure. But how much are you going to worry...
By Paul Whytock | 19-07-2017
We all know that industrial networks, endpoints and control systems have inherent insecurities making them vulnerable to compromise through digital methods. With over 5.6 million devices being newly connected added each day in 2016 and with an estimated 21 bil...
By Nigel Seymour | 12-07-2017