Securing the Internet of Things for Industrial and Utility Companies by Doug | Mar 13, 2018The IBM Institute for Business Value has released a report on the Internet of Threats that outlines the vulnerabilities industrial […]
Demystifying IoT Cybersecurity by Doug | Sep 1, 2017The Internet of Things introduces new vulnerabilities across the entire ecosystem. Here’s what you need to know and prepare for, […]
iDTRONIC GmbH Provides Burg F.W. Lüling KG With Embedded Modules by Doug | Feb 6, 2017Last year, Burg F.W. Lüling KG, a manufacturer of locks and locking systems, entered into a partnership with iDTRONIC GmbH, […]
Internet of Things Security and Privacy Recommendations by Doug | Dec 1, 2016The Broadband Internet Technical Advisory Group (BITAG) highlights a number of issues that contribute to the lack of privacy and […]
Security Solutions and Services for the IoT by Doug | May 5, 2016Security is a major industry concern that could significantly slow Internet of Things market growth. IoT security is a multi-layered […]
Simplifying Security for IoT Device Engineers and Manufacturers by Doug | May 2, 2016The idea of providing network security to legacy embedded systems and the latest IoT devices is taking hold in the […]
Performance Analysis of an RFID Prototype System to Control Personnel Access by Doug | Feb 26, 2015Yaneth Patricia López Mutis, Lucero Marisol Manquillo Lagos and Víctor Fabián Miramá Pérez present their analysis of a prototype UHF […]
RSA Algorithm as a Data Security Control Mechanism in RFID by Doug | Jan 20, 2015Researcher Jonathan Sangoro explains how information security and privacy issues can be avoided when deploying a radio frequency identification system, […]
Enhancement of Security in RFID Using RSA Algorithm by Doug | Nov 12, 2014Jonathan Sangoro, Professor Waweru Mwangi and Dr. Michael Kimwele of Jomo Kenyatta University of Agriculture and Technology’s School of Computing […]
Best IT Asset Management Through Smart RFID Software by Doug | Dec 5, 2013Art Barton, RFTrail’s director of RFID strategies, discusses how CIOs, finance managers, IT managers and others responsible for managing the […]