Training & Events
Young man attending webinar on laptop
NXP S32K3 - Safety & Security in Industrial & Automotive applications
Date: February 15, 2023
Location: online, on-demand
Security   Filter By   Security RSS FEED
The pace of innovation around security is exciting. From encryption standards to security application development—explore our resources to get technical expertise and stay up to date with security trends and technology.
STM32 MCU Series
Transformative IoT solutions with the STM32 32-bit Wireless MCU Series
June 1, 2023
Choosing the right microcontroller for your project is crucial. In this post, we’ll explore the capabilities of ST’s 32-bit wireless MCU, STM32WBA52 and the IoT applications that benefit most from them.
ST's STEVAL-PROTEUS1 evaluation kit
Key Considerations of Condition Monitoring
February 27, 2023
Condition monitoring is one of the pivotal ways in which the advent of Industry 4.0 is bringing about major improvements within the industrial sector.
Hand picking various assets on the touch screen
Asset tracking: Optimising your capital assets and enabling real-time supply chain visibility
By Mike Hartmann   -   October 11, 2022
Asset tracking must be one of the best internet of things (IoT) applications created this decade.
Illustration of IoT nodes over the city skyline
Selecting the optimum MCU for your IoT application
September 21, 2022
A plethora of MCUs is available on today’s market, at different price points and offering varying levels of resource such as processing power, security features, supported wireless protocols and power consumption.
Image of virtual locks
Network Transformation: Taking Security to the edge
April 22, 2022
Large enterprises still operate huge data centres.
Different types of Dryad sensors
When IoT means 'Internet of Trees'
December 10, 2021
Being able to discover forest fires early is an increasingly urgent issue.
Electric nodes dome over the city
Innovative technology drives rapid deployment of new 5G products, services and business models
December 2, 2021
Optimizing cost, power, and performance to ensure the second wave of 5G is a success.
Green-philtered city panorama with nodes connected over the city
Accelerating 5G Baseband With Adaptive SoCs
September 2, 2021
New chip architectures for next-gen communication
Schwinn Cycling Trainer tablet mounted on a treadmill
Smart Products: IoT technology in everyday products
June 5, 2021
New IoT-Technology in every day products. Customers use these products in many fields – including smart homes, health, kitchen,
Employee monitoring industrial robots
Interview Thomas Pilz: Cyberattack victim - Fight like Rocky!
June 4, 2021
Pilz Automation, an industrial automation specialist founded in 1948, suffered a crippling cyberattack in 2019.
Connected power nodes glowing in the dark
Documentation – Beware of Backdoors!
June 4, 2021
It doesn’t matter if you hide a duplicate key under the doormat or in a bank safe, if there is a duplicate key somewhere, someone will eventually find it.
Parking garage, woman standing in front of empty spot with a digital outline of a car
IoT in Stolen Vehicle Recovery: It’s a Steal!
May 30, 2021
With the use of motor vehicles still on the rise, auto theft has become an increasing problem. New technologies are needed to protect vehicles
Illustration of date streams in front of a world map
ICS Vulnerabilities: No Lockdown for ICS Hackers
May 30, 2021
Industrial control system vulnerabilities are increasing – at the same time, awareness of the security of industrial networks is growing.
Ceiling with emergency exit signs and flames shooting up
Smart Sensors: Hot Stuff
May 30, 2021
Healthy sales volumes and highly integrated chips mean it has never been so cheap and easy to buy reliable protection against fire damage.
Illustration of an eSIM card
eSIMs: The Great IoT Connectivity Lockdown
May 29, 2021
When you move house your devices go with you. It’s not so simple in the global communications world but eSIMs promise to break through the barriers that tie us down.
Illustration of date streams in front of a world map
Disaster Prevention and IoT: Weather or not?
May 29, 2021
From prediction to recovery, IoT is helping humans to cope with extreme weather and other threatening phenomena on our fickle planet – effectively putting Mother Nature on the defensive.
Cars and houses in a snowy night
Smart Utilities: Coming in from the Cold
May 29, 2021
It seems polar conditions can happen anywhere, so how can smart utilities use IoT to ensure uninterrupted delivery to their customers?
Human eye observing binary code
IoT Security: Identity of things
May 29, 2021
Every device, app, service, and interface in IoT needs its own identity, which operators can use to track and analyze activity. This is not only used to identify problems but also to protect the systems from attacks, attempted fraud, and espionage.
Open safe glowing from the inside
Standardization Versus Risk Management: How Much Cybersecurity Is Enough?
May 28, 2021
Cybersecurity is a risk management issue which depends on risk appetite, risk exposure, and many other things.
QR code example
Cybersecurity Labeling in Finland: A Sure Sign of Safety
May 28, 2021
Traficom in Finland has launched a cybersecurity label that guarantees labeled devices have basic information security features built in.
Illustration of a person controlling smart home via smart phone
EU Radio Equipment Directive (RED): How Insecure is Consumer IoT?
May 28, 2021
A principal factor that will shape the views of the EU Radio Equipment Directive (RED) delegated act relates to how significant groups or individuals view the scale of the cybersecurity problem in consumer devices.
Smart cars in a crossroad
Building the right security foundation for connected devices
December 18, 2020
Advances in IoT have led to a boom in connected devices, so security is more important than ever. Discover how to build the right security foundation.
Picture of lighting power
Power Management: The Power of Nanopower
November 3, 2020
Changing batteries attached to ampere-sucking devices is a time-consuming, costly bore.
Photo of safe box with virtual numbers
IoT and Data Ownership: Your Device your Data?
November 2, 2020
Greater openness across IoT data ecosystems will result in a broader range of services being offered to end users.
Woman using VR goggles
The EU Cybersecurity Act: A Price worth Paying
June 23, 2020
With businesses and consumers in Europe facing ever-more sophisticated cyber threats, policy makers are scrambling to ensure there are adequate regulations to help protect them
Light finding its way through the holes
Li-Fi: IoT at the Speed of Light
By Gerhard Kafka   -   February 19, 2020
The optical light communication called Light Fidelity (Li-Fi), using LED-based light sources as data transmitters, offers an alternative to existing technologies such as Wi-Fi and LTE.
Illustration of a shield
Authentication and Identity Management: About Security and Things
February 16, 2020
Strong authentication and identity management will play a crucial role as companies and organizations move toward the goal of a totally connected world.
Augmented Reality - digital revolution
Augmented Reality: Making a MES
February 16, 2020
Augmented-Reality (AR) is very much part of the digital revolution in manufacturing.
Intelligent Leak Detection - a leaking valve
Intelligent Leak Detection: Plugging the Holes
February 14, 2020
Water leaks, even small ones, can add up to large volumes of wasted clean water and – increased costs for property owners.
Cybercrime in space - satellites around the globe
Cybercrime in Space: How Secure Are Satellites?
February 14, 2020
Unlike their military counterparts, civilian GNSS systems are vulnerable to jamming and spoofing. Cybercrime in Space must change
First        1  2        Last          Results Per Page: 30  60  90  All