Security


Infineon adds Semper Security to FLASH

With security becoming an increasingly important aspect to product design, Infineon have announced that they will be including Semper Security into their NOR Flash memory. What is Semper Security, and how is the inclusion of Semper into NOR Flash memory demons...

By Robin Mitchell | 13-07-2020

Internet of Threats - 5 IoT Security Concerns

The Internet of Things (IoT) continues to rise in popularity. Now, it seems almost anything boasts Internet connectivity, from single-board computers, mobile devices, and TVs to fridges. Outside of consumer IoT, industrial IoT is incredibly prevalent. Plus, ev...

By Moe Long | 11-11-2019

Presence Detection for Enhanced Security

Introduction Presence detectors specially designed for buildings with a large coverage area are a new security and safety feature that is rapidly becoming a part of the security marketplace. A presence detector monitors the detection zone for occupancy. If a p...

By Nnamdi Anyadike | 02-09-2019

New Generation of Security Challenges for the Modern Business

Information Technology departments are usually on the ball when it comes to traditional threats. Bad passwords, viruses, and website whitelists are all par for the course. Managing portable assets (phones, tablets, USB flash memory, etc.) is also a key element...

By Christian Cawley | 14-05-2019

Wireless security cameras overcome ‘glitch’ fears

Wireless security cameras are rapidly becoming more sophisticated with the latest models now equipped with motion detection sensors and the ability to record footage of an intruder. More advanced cameras include facial recognition and two-way audio. But regard...

By Nnamdi Anyadike | 14-01-2019

Public Cloud Services: Will They Open the Doors to Cyber Criminals?

Public cloud computing and storage services are rapidly becoming the norm and overtaking the alternative strategy where companies build their own private cloud. Will this open more doors through which cybercriminals can infiltrate company networks? This questi...

By Paul Whytock | 16-04-2018

Now you can maintain your data security from the grave

Cyber security and the stealing of personal data is big news these days and so its not surprising that I receive a regular stream of press releases from expert companies expounding their theories on how to keep data secure. But how much are you going to worry...

By Paul Whytock | 19-07-2017

Staying ahead of ICS security vulnerabilities

We all know that industrial networks, endpoints and control systems have inherent insecurities making them vulnerable to compromise through digital methods. With over 5.6 million devices being newly connected added each day in 2016 and with an estimated 21 bil...

By Nigel Seymour | 12-07-2017