Connected Industrial Devices – How to Protect them Against CyberAttacks - Story
July 13, 2021In todays connected environment, strong data protection for IoT devices and connected machines is no longer a nice-to-have—it is essential.
How to Protect Embedded Systems from the Quantum Apocalypse - Story
August 24, 2020The Quantum Apocalypse is coming. Sound scary? Well it can be. If you have information, systems, and devices that need to be kept secure and private, your organization needs to prepare.
Protecting Remote Workers with PKI - Blog
May 20, 2020Organizations with a large percentage of employees working from home have faced challenges in scaling to support the surge in remote workers.
Security Checklist for IoT Sensors - Story
March 27, 2020Security can become an afterthought. As a result, examples of insecure devices abound, from medical devices with hard-coded passwords to home routers with backdoors.
Yes, It's Possible to Protect Home Doorbells and Cameras Against Hackers - Story
January 13, 2020Ring doorbells and cameras have joined the ever-growing list of IoT devices that have been compromised by hackers. According to reports, credentials to 3000 Ring accounts have been compromised.
Ensure IDS/IPS and application layer protection beyond the RTOS for your embedded devices - Other
October 29, 2014Seventy percent of cyber attacks target the application layer. While a secure RTOS provides features that are critical for security in embedded device...