The pace of innovation around security is exciting. From encryption standards to security application development—explore our resources to get technical expertise and stay up to date with security trends and technology.
Transformative IoT solutions with the STM32 32-bit Wireless MCU Series
June 1, 2023
Choosing the right microcontroller for your project is crucial. In this post, we’ll explore the capabilities of ST’s 32-bit wireless MCU, STM32WBA52 and the IoT applications that benefit most from them.
Key Considerations of Condition Monitoring
February 27, 2023
Condition monitoring is one of the pivotal ways in which the advent of Industry 4.0 is bringing about major improvements within the industrial sector.
Asset tracking: Optimising your capital assets and enabling real-time supply chain visibility
By
Mike Hartmann
-
October 11, 2022
Asset tracking must be one of the best internet of things (IoT) applications created this decade.
Selecting the optimum MCU for your IoT application
September 21, 2022
A plethora of MCUs is available on today’s market, at different price points and offering varying levels of resource such as processing power, security features, supported wireless protocols and power consumption.
Network Transformation: Taking Security to the edge
April 22, 2022
Large enterprises still operate huge data centres.
When IoT means 'Internet of Trees'
December 10, 2021
Being able to discover forest fires early is an increasingly urgent issue.
Innovative technology drives rapid deployment of new 5G products, services and business models
December 2, 2021
Optimizing cost, power, and performance to ensure the second wave of 5G is a success.
Accelerating 5G Baseband With Adaptive SoCs
September 2, 2021
New chip architectures for next-gen communication
Smart Products: IoT technology in everyday products
June 5, 2021
New IoT-Technology in every day products. Customers use these products in many fields – including smart homes, health, kitchen,
Interview Thomas Pilz: Cyberattack victim - Fight like Rocky!
June 4, 2021
Pilz Automation, an industrial automation specialist founded in 1948, suffered a crippling cyberattack in 2019.
Documentation – Beware of Backdoors!
June 4, 2021
It doesn’t matter if you hide a duplicate key under the doormat or in a bank safe, if there is a duplicate key somewhere, someone will eventually find it.
IoT in Stolen Vehicle Recovery: It’s a Steal!
May 30, 2021
With the use of motor vehicles still on the rise, auto theft has become an increasing problem. New technologies are needed to protect vehicles
ICS Vulnerabilities: No Lockdown for ICS Hackers
May 30, 2021
Industrial control system vulnerabilities are increasing – at the same time, awareness of the security of industrial networks is growing.
Smart Sensors: Hot Stuff
May 30, 2021
Healthy sales volumes and highly integrated chips mean it has never been so cheap and easy to buy reliable protection against fire damage.
eSIMs: The Great IoT Connectivity Lockdown
May 29, 2021
When you move house your devices go with you. It’s not so simple in the global communications world but eSIMs promise to break through the barriers that tie us down.
Disaster Prevention and IoT: Weather or not?
May 29, 2021
From prediction to recovery, IoT is helping humans to cope with extreme weather and other threatening phenomena on our fickle planet – effectively putting Mother Nature on the defensive.
Smart Utilities: Coming in from the Cold
May 29, 2021
It seems polar conditions can happen anywhere, so how can smart utilities use IoT to ensure uninterrupted delivery to their customers?
IoT Security: Identity of things
May 29, 2021
Every device, app, service, and interface in IoT needs its own identity, which operators can use to track and analyze activity. This is not only used to identify problems but also to protect the systems from attacks, attempted fraud, and espionage.
Standardization Versus Risk Management: How Much Cybersecurity Is Enough?
May 28, 2021
Cybersecurity is a risk management issue which depends on risk appetite, risk exposure, and many other things.
Cybersecurity Labeling in Finland: A Sure Sign of Safety
May 28, 2021
Traficom in Finland has launched a cybersecurity label that guarantees labeled devices have basic information security features built in.
EU Radio Equipment Directive (RED): How Insecure is Consumer IoT?
May 28, 2021
A principal factor that will shape the views of the EU Radio Equipment Directive (RED) delegated act relates to how significant groups or individuals view the scale of the cybersecurity problem in consumer devices.
Building the right security foundation for connected devices
December 18, 2020
Advances in IoT have led to a boom in connected devices, so security is more important than ever. Discover how to build the right security foundation.
Power Management: The Power of Nanopower
November 3, 2020
Changing batteries attached to ampere-sucking devices is a time-consuming, costly bore.
IoT and Data Ownership: Your Device your Data?
November 2, 2020
Greater openness across IoT data ecosystems will result in a broader range of services being offered to end users.
The EU Cybersecurity Act: A Price worth Paying
June 23, 2020
With businesses and consumers in Europe facing ever-more sophisticated cyber threats, policy makers are scrambling to ensure there are adequate regulations to help protect them
Li-Fi: IoT at the Speed of Light
By
Gerhard Kafka
-
February 19, 2020
The optical light communication called Light Fidelity (Li-Fi), using LED-based light sources as data transmitters, offers an alternative to existing technologies such as Wi-Fi and LTE.
Authentication and Identity Management: About Security and Things
February 16, 2020
Strong authentication and identity management will play a crucial role as companies and organizations move toward the goal of a totally connected world.
Augmented Reality: Making a MES
February 16, 2020
Augmented-Reality (AR) is very much part of the digital revolution in manufacturing.
Intelligent Leak Detection: Plugging the Holes
February 14, 2020
Water leaks, even small ones, can add up to large volumes of wasted clean water and – increased costs for property owners.
Cybercrime in Space: How Secure Are Satellites?
February 14, 2020
Unlike their military counterparts, civilian GNSS systems are vulnerable to jamming and spoofing. Cybercrime in Space must change