The pace of innovation around security is exciting. From encryption standards to security application development—explore our resources to get technical expertise and stay up to date with security trends and technology.
Transformative IoT solutions with the STM32 32-bit Wireless MCU Series
2023年6月1日
Choosing the right microcontroller for your project is crucial. In this post, we’ll explore the capabilities of ST’s 32-bit wireless MCU, STM32WBA52 and the IoT applications that benefit most from them.
Key Considerations of Condition Monitoring
2023年2月27日
Condition monitoring is one of the pivotal ways in which the advent of Industry 4.0 is bringing about major improvements within the industrial sector.
Asset tracking: Optimising your capital assets and enabling real-time supply chain visibility
By
Mike Hartmann
-
2022年10月11日
Asset tracking must be one of the best internet of things (IoT) applications created this decade.
Selecting the optimum MCU for your IoT application
2022年9月21日
A plethora of MCUs is available on today’s market, at different price points and offering varying levels of resource such as processing power, security features, supported wireless protocols and power consumption.
Network Transformation: Taking Security to the edge
2022年4月22日
Large enterprises still operate huge data centres.
When IoT means 'Internet of Trees'
2021年12月10日
Being able to discover forest fires early is an increasingly urgent issue.
Innovative technology drives rapid deployment of new 5G products, services and business models
2021年12月2日
Optimizing cost, power, and performance to ensure the second wave of 5G is a success.
Accelerating 5G Baseband With Adaptive SoCs
2021年9月2日
New chip architectures for next-gen communication
Smart Products: IoT technology in everyday products
2021年6月5日
New IoT-Technology in every day products. Customers use these products in many fields – including smart homes, health, kitchen,
Interview Thomas Pilz: Cyberattack victim - Fight like Rocky!
2021年6月4日
Pilz Automation, an industrial automation specialist founded in 1948, suffered a crippling cyberattack in 2019.
Documentation – Beware of Backdoors!
2021年6月4日
It doesn’t matter if you hide a duplicate key under the doormat or in a bank safe, if there is a duplicate key somewhere, someone will eventually find it.
IoT in Stolen Vehicle Recovery: It’s a Steal!
2021年5月30日
With the use of motor vehicles still on the rise, auto theft has become an increasing problem. New technologies are needed to protect vehicles
ICS Vulnerabilities: No Lockdown for ICS Hackers
2021年5月30日
Industrial control system vulnerabilities are increasing – at the same time, awareness of the security of industrial networks is growing.
Smart Sensors: Hot Stuff
2021年5月30日
Healthy sales volumes and highly integrated chips mean it has never been so cheap and easy to buy reliable protection against fire damage.
eSIMs: The Great IoT Connectivity Lockdown
2021年5月29日
When you move house your devices go with you. It’s not so simple in the global communications world but eSIMs promise to break through the barriers that tie us down.
Disaster Prevention and IoT: Weather or not?
2021年5月29日
From prediction to recovery, IoT is helping humans to cope with extreme weather and other threatening phenomena on our fickle planet – effectively putting Mother Nature on the defensive.
Smart Utilities: Coming in from the Cold
2021年5月29日
It seems polar conditions can happen anywhere, so how can smart utilities use IoT to ensure uninterrupted delivery to their customers?
IoT Security: Identity of things
2021年5月29日
Every device, app, service, and interface in IoT needs its own identity, which operators can use to track and analyze activity. This is not only used to identify problems but also to protect the systems from attacks, attempted fraud, and espionage.
Standardization Versus Risk Management: How Much Cybersecurity Is Enough?
2021年5月28日
Cybersecurity is a risk management issue which depends on risk appetite, risk exposure, and many other things.
Cybersecurity Labeling in Finland: A Sure Sign of Safety
2021年5月28日
Traficom in Finland has launched a cybersecurity label that guarantees labeled devices have basic information security features built in.
EU Radio Equipment Directive (RED): How Insecure is Consumer IoT?
2021年5月28日
A principal factor that will shape the views of the EU Radio Equipment Directive (RED) delegated act relates to how significant groups or individuals view the scale of the cybersecurity problem in consumer devices.
Building the right security foundation for connected devices
2020年12月18日
Advances in IoT have led to a boom in connected devices, so security is more important than ever. Discover how to build the right security foundation.
Power Management: The Power of Nanopower
2020年11月3日
Changing batteries attached to ampere-sucking devices is a time-consuming, costly bore.
IoT and Data Ownership: Your Device your Data?
2020年11月2日
Greater openness across IoT data ecosystems will result in a broader range of services being offered to end users.
The EU Cybersecurity Act: A Price worth Paying
2020年6月23日
With businesses and consumers in Europe facing ever-more sophisticated cyber threats, policy makers are scrambling to ensure there are adequate regulations to help protect them
Li-Fi: IoT at the Speed of Light
By
Gerhard Kafka
-
2020年2月19日
The optical light communication called Light Fidelity (Li-Fi), using LED-based light sources as data transmitters, offers an alternative to existing technologies such as Wi-Fi and LTE.
Authentication and Identity Management: About Security and Things
2020年2月16日
Strong authentication and identity management will play a crucial role as companies and organizations move toward the goal of a totally connected world.
Augmented Reality: Making a MES
2020年2月16日
Augmented-Reality (AR) is very much part of the digital revolution in manufacturing.
Intelligent Leak Detection: Plugging the Holes
2020年2月14日
Water leaks, even small ones, can add up to large volumes of wasted clean water and – increased costs for property owners.
Cybercrime in Space: How Secure Are Satellites?
2020年2月14日
Unlike their military counterparts, civilian GNSS systems are vulnerable to jamming and spoofing. Cybercrime in Space must change