Working From Home? Here’s What You Need for Cybersecurity

Working From Home? Here’s What You Need for Cybersecurity

There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to cybersecurity risks. Where should cybersecurity fit in? The current workplace reality…

Medical Device Safety and Security: Obvious but not easy to achieve

Medical Device Safety and Security: Obvious but not easy to achieve

With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two increasingly vital requirements in medical device design. In April 2018, the U.S.…

Supply Chain Economics and Cybersecurity

Supply Chain Economics and Cybersecurity

Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of…

Cybersecurity and Data Concerns in 5G

Cybersecurity and Data Concerns in 5G

For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One…

Extend the Lifecycle of Embedded Systems with a Hypervisor

Extend the Lifecycle of Embedded Systems with a Hypervisor

Multiple embedded systems are at the heart of medical devices, transportation systems, automobiles, heavy equipment, and industrial robotics. In complex systems like these, a hypervisor provides the supervision to safely and reliably allowing separate functional software…

IoT: Three Types of Security

IoT: Three Types of Security

IoT security will never be confused with Fort Knox. It is very important that IoT to be secure in a way that is both technically and economically appropriate. But an IoT strategy that does not incorporate…

Identifying Compromises Through Device Profiling

Identifying Compromises Through Device Profiling

The Internet and our local networks have the ability to handle an amazing quantity of connections simultaneously. That strength leads to a problem when we’re trying to detect malicious traffic: how can we tell when one…