Researchers at New York University Abu Dhabi’s Design for Excellence lab (NYUAD) have developed new innovations in computer chip technology that present landmark achievements...
Security flaws found in USB-connected devices raise questions about the trustworthy of the devices. Apparently, USB connections should be redesigned to offer more security,...
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
As IoT matures, applications will be limited only by users’ imaginations. That’s the prediction of Lisa Litherland, a business architect who helps institutions create...
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
Electricity grid operators in the U.S. experience near constant cyberattacks, with one utility recording approximately 10,000 cyberattacks a month.
Cybersecurity issues can come up...
A new Video IoT Platform was recently launched by Gorilla Technology at the 2017 International Security Conference (ISC West) in Las Vegas.
The Internet...
Micron Technology and Microsoft have recently announced a collaboration in order to address the major challenge of providing trusted computing models for IoT deployments...
A new Video IoT Platform for security and commercial uses has been released recently by Gorilla Technology, a global provider of video intelligence and...
Cisco has created a video analytics tool that, according to iothub.com, promises to help public transportation operators understand the nature of their passengers and...
Many people are present this morning at the Startup Festival and Startup Live Competition organized by iHLS for the second year.
The first 10 startups...
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
Security vulnerabilities were found at a popular security product. A security researcher has recently published a vulnerability and proof-of-concept exploits in Google's Internet of...