Admin

Admin

Popular

Discover swIDch at MWC22 for the future of authentication in cyber security
Discover swIDch at MWC22 for the future of authentication in cyber security
Feb 24 2022

OTAC-embedded-Smart Card will change the future of authentication in the telecom industry and...

Read More
The 2022 IoT clamp down: how impending UK regulations are influencing the market
The 2022 IoT clamp down: how impending UK regulations are influencing the market
Jan 27 2022

Governments are becoming increasingly aware of the importance of IoT security, not only because of...

Read More
Is there a solution to the hacking problem behind the convenient IoT world?
Is there a solution to the hacking problem behind the convenient IoT world?
Jan 12 2022

The world is getting smarter. As various products in our daily life are connected to the network,...

Read More
Drone Misuse: A Threat To Be Reckoned With
Drone Misuse: A Threat To Be Reckoned With
Dec 15 2021

A recent report published by the Department for Business, Energy & Industrial Strategy (BEIS)...

Read More
Why the Cyber Security of your business is in the hands of your most frustrated employee
Why the Cyber Security of your business is in the hands of your most frustrated employee
Dec 08 2021

According to a study by Tech News World, more than half of US IT and cybersecurity professionals...

Read More
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 29 2021

Welcome to the final instalment, part 4 of our IoT security vulnerabilities blog series. As I’ve...

Read More
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Nov 10 2021

Remote working environments are not necessarily new to business, but are certainly fast becoming...

Read More
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 10 2021

Join me, Charlie Choi, for Part 3 of our Key IoT Vulnerabilities series, with a focus on OWASP IoT...

Read More
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 26 2021

Join me, Charlie Choi, as I once again walk you through the OWASP IoT Top 10 in the 2nd part of our...

Read More
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 11 2021

The IoT (Internet of Things) accounts for the billions of physical devices that connect to the...

Read More

Featured

Iberian Blackout Shows Why OT Cybersecurity Can’t Be an Afterthought
Iberian Blackout Shows Why OT ...
Read More
Why Securing Distributed Control Systems Is No Longer Optional
Why Securing Distributed ...
Read More
Why Revolutionary Security Solutions Often Struggle in OT Environments
Why Revolutionary Security ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter