Please turn on your JavaScript for this page to function normally.
How talking to recognition technologies will change us

Ernest Hemmingway once said, “I have learned a great deal from listening carefully. Most people never listen.” Perhaps, like most of the things we do, technology will absolve …

End-to-end encryption is key for securing the Internet of Things

The Internet of Things (IoT) is one of the hottest buzzwords these days. It seems like almost everything is being connected, including cars, streetlights, oil rigs, wearables …

It’s undeniable, IoT will change security forever

Over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of Things (IoT) by …

If you build it, they will come

If you build it, they will come. But will you be ready? Will any of us? It’s almost impossible to escape the topic of the Internet of Things (IoT). Whatever the technology …

Addressing IoT risks with a trust framework

The Online Trust Alliance (OTA) released its Internet of Things Trust Framework, the first global, multi-stakeholder effort to address IoT risks comprehensively.The framework …

IoT devices: The good, the bad and the ugly

Cognosec has revealed critical security flaws in ZigBee, one of the most popular wireless communication standards used by Internet of Things (IoT) devices today.Speaking at …

Defending the enterprise in an increasingly complex environment

Technology has transformed the way organisations work and its evolution is now faster than ever before. The promise of IT transformation presents many opportunities for …

Security challenges emerging with the rise of the personal cloud

Personal cloud is growing in importance as it shapes how employees operate across their digital lives, according to Gartner. End-user computing (EUC) and digital workplace …

MatrixSSL Tiny: A TLS software implementation for IoT devices

INSIDE Secure announced the availability of MatrixSSL Tiny, the world’s smallest Transport Layer Security (TLS) software implementation, to allow companies to affordably …

Researchers hack Linux-powered sniper rifle

When talking about the Internet of Things – “things” with an embedded computing system able to interoperate within the Internet infrastructure – we …

Internet of Things: Bracing for the data flood

There’s a real opportunity now to incorporate the scaling and management (including security management) needs for the IoT in the way we plan our enterprise and consumer …

Security flaws discovered in popular Smart Home Hubs

Smart Home Hubs are used to control lighting, heating, locks and cameras in people’s homes. Unsurprisingly, many security experts worry about the privacy and safety risks …

Don't miss

Cybersecurity news