If you are worried about the state of security in your company but don’t really know where to start, then you should consider performing a security assessment to review the current state of your environment.
Do you implement applications that collect people’s personal data - name, phone number, email address, photos, videos, IP addresses - basically anything that can be connected to a person? Did you know that European Union-wide regulation could make your lovingly created application useless after May 2018?
Let’s zoom in on a classic challenge: how to combine Security Development Lifecycle (SDL) with an agile way of developing software.
The internet of things (IoT) and Industrial Internet of Things (IIoT) have been hot topics across many industries for the past years. Recent developments in pervasiveness of connectivity, advances in data science and machine learning as well as reductions in the cost and power consumption of hardware are now making it possible for companies to deploy IoT solutions more effortlessly and cost-efficiently than ever before. While there are many examples of IoT solutions generating tremendous value and cost savings for companies, many are still waiting to get started.
Developing a highly customized compiler is like being on board the Starship Enterprise.
Travelling deep into the microcosmos of the ARM architecture is nothing short of a journey into your own mind. To plot your uncharted course through the function nebulae unknown to the Vulcan database, to break alien code to subatomic particles and to re-assemble it again with a transporter function, to seek out new algorithms, to boldly go…
As a business or a service owner, you have all sorts of priorities. How high does software security rank on your list? Security is one of the cornerstones that can make or break your product.
In information security, military-grade systems are often viewed as the “Champions League” of the business. Think of sovereign state level resourcing, devoted security officers, fortified data centers designed to survive nuclear attacks, heavily armed guards, and so on. National security systems often use the strongest line of cyber defense known to man: strict physical isolation.
When information security incidents can have impacts to the real physical world, people talk about cyber security. But what does virtual reality have to do with cyber security? Tom’s video report from the Düsseldorf M2M Summit sheds some light on this tricky question.
Intopalo, a digitalization solution house based in Finland, and INSIDE Secure, a global leader in embedded security, have started a deep collaboration to provide security solutions for critical Industrial Internet and mobile applications.