Dell announces an air gap version of its Dell Endpoint Security Suite Enterprise solution to address the need for highly-secure industries to keep their endpoints isolated from the internet, yet still deploy an advanced threat protection solution. The solution integrates Cylance technology using artificial intelligence and predictive mathematical models to help protect against advanced persistent […]
Security
Chip design IP emphasizes software integrity and security
Synopsys, Inc. announced key updates to its Software Integrity Platform that are designed to help companies build security and quality into their software while reducing time-to-market. In the era of digital transformation, building secure and reliable software is challenged by the rapid, complex and diverse nature of development cycles. The latest updates to the Synopsys Software Integrity Platform […]
Server/storage motherboards optimized for Xeon Scalable processors
Super Micro Computer, Inc. has released a comprehensive line of new X11 generation server and storage motherboard and chassis solutions fully optimized for the new Intel® Xeon® Scalable processors. The Supermicro X11 dual-processor (DP) and uniprocessor (UP) Serverboards and SuperWorkstation boards support the Intel® Xeon® Scalable processors for exceptional performance. They are offered in a variety of form […]
Modules handle LPWAN keys for secure IoT networks
New long-range and low-power IoT (Internet of Things) technologies like Low-Power Wide Area Networks (LPWAN) are enabling new use cases in application areas such as smart cities, smart agriculture, smart manufacturing, and work safety. Alongside robustness and availability, Security is a key to successful adoption of these new applications. G+D Mobile Security, Murata, and STMicroelectronics […]
FPGAs include SRAM physical unclonable function for high security
Microsemi Corporation today announced Intrinsic ID’s static random-access memory (SRAM) physical unclonable function (SRAM PUF) is included in Microsemi’s new PolarFire field programmable gate arrays (FPGAs). QUIDDIKEY-FLEX is a state-of-the-art high-security key generation and storage mechanism offering advanced security features based on SRAM PUF. The SRAM PUF hardware serves as a primary element in the security of Microsemi’s PolarFire […]
Ultra-low-energy authentication and data protection for constrained IoT devices
SecureRF and Andes Technology today announced they have partnered to offer fast, quantum-resistant security for constrained IoT devices. This collaboration enables companies to use AndesCore™ secure processor in combination with SecureRF’s asymmetric (public-key) cryptosystems. Andes’ secure memory protection and tamper-resistance protection provides shield against attacks. SecureRF’s authentication and data protection solutions provide strong protection for IoT […]
Vigilante Cyber-Justice in the Wild, Wild IoT
by Alan Grau, president and co-founder of Icon Labs. Stories of vigilante justice during the “wild, wild west” period in US history are legendary. According to legend, outlaws roamed cattle towns and remote settlements overwhelming law enforcement and thriving wherever law enforcement was lax. Whenever things got too bad, citizens would sometimes band together and […]
Riding a secure IoT wave
What’s been called the Third Wave of Computing — IoT — probably feels more like a tidal wave to the multitude of hardware, software, cloud, and other IoT-related manufacturers and service providers. That is, in part, because riding that wave is a lack of interoperability, ecosystem immaturity, data privacy, time-to-market, multiple technology choices, and the […]
IoT Certificate management for OPTIGA Trusted Platform Modules
Icon Labs announced its IoT Certificate management solution supports Infineon Technologies’ OPTIGA™ Trusted Platform Module (TPM). The partnership enables device manufacturers to manage PKI certificates throughout the product lifecycle using the OPTIGA™ TPM, including support for certificate injection during device manufacturing. Instead of having to manually install a certificate into each device, the device comes […]
Server-side certificate management for authentication via public keys
Icon Labs, a leading provider of security solutions for IoT and edge devices, today announced the availability of the Floodgate Certificate Authority (CA). Floodgate CA is the server side portion of Icon Labs’ PKI solution and provides certificate management for companies choosing to implement their own certificate-based authentication using public key infrastructure. IoT security requires […]