In the News

IoT Security: How Far We’ve Come, How Far We Have to Go

Date Published: January, 08, 2020

As organizations fear the proliferations of connected devices on enterprise networks, the private and public sector come together to address IoT vulnerabilities. "The focus from the EU is a good one, it is important, and we have to take that into conside… READ MORE

AMI Selected to Join the NIST National Cybersecurity Excellence Partnership at the National Cybersecurity Center of Excellence

Date Published: December, 16, 2019

NORCROSS, GEORGIA: AMI®, a global leader in powering, managing, and securing the world's mission-critical connected infrastructure through its BIOS, BMC and security solutions, is pleased to be selected to join the National Institute of Standards and Te… READ MORE

Cyber security in 2020 and beyond: Insights from the experts

Date Published: December, 05, 2019

In 2020, 5G is expected to finally begin making an impact on taking connectivity to the next level – but with that comes a raft of cyber security dilemmas for businesses. Dan Robinson finds out from company bosses how they’re preparing to combat the t… READ MORE

What’s New with Trusted Computing?

Date Published: November, 25, 2019

In this spotlight edition of the podcast, sponsored by Trusted Computing Group* Steve Hanna joins us to talk about TCG’s 20th anniversary and how the group is tooling up to confront the challenge of securing billions of Internet of Things devices. … READ MORE

How Healthy Is Your Web of Connected Devices?

Date Published: November, 06, 2019

By: Tom Brostrom In recent years, the evolution of the Internet of Things (IoT) has seen an explosion in the number of devices connected to the Internet—a trend which is set to continue long into the future with the development of new applications dr… READ MORE

Trusted Computing Group meets in Toronto to discuss security standards

Date Published: October, 28, 2019

Representatives of some of the biggest names in computing have been quietly meeting in Toronto this week to discuss some of the smallest but vital intricacies of device security. The Trusted Computing Group, whose open standards are used to build secur… READ MORE

Hardware-based encryption is the key to future proofing data protection concerns

Date Published: October, 21, 2019

With recent changes to data protection laws, the data protection landscape is rapidly changing in scope, breadth and depth. Data protection is no longer simply a part of risk management, but also governance and compliance – meaning organizations today m… READ MORE

Why Companies Are Forming Cybersecurity Alliances

Date Published: September, 13, 2019

In the physical world, governments are responsible for keeping citizens and corporations safe from enemies. The digital world, so far, has been a little different. When it comes to cybersecurity and cyber attacks, most governments have spent much more tim… READ MORE

Editor’s Question: How important is cybersecurity education for young people for closing the cyberskills gap?

Date Published: July, 02, 2019

The majority of UK parents are in the dark when it comes to advising their children on a career in cybersecurity, research from global cybersecurity training provider, SANS Institute, shows.… READ MORE

Chip Security Emerges a Hot Topic in the Supply Chain

Date Published: June, 21, 2019

For electronics OEMs, ensuring that the semiconductor chips that they source and use are secure and safe is becoming increasingly important as the sophistication of both the systems and of cybercriminals increase. It’s important to think about security … READ MORE