DE · Topics · Cybersecurity

Cybersecurity

Top Story

Engineering’s Link to Blockchain
The technology associated with cryptocurrency offers new approaches to data security and transaction record integrity.
Encrypted Sensors Has Programmed Encryption onto FPGA Hardware Chip
The company says it has applied to trademark it as an actual private network.
Manufacturing Industry Vulnerable to Cyberattack
The industry is becoming increasingly susceptible to such attacks as additive manufacturing (AM) gains wider acceptance, bringing with it a more decentralized approach that allows for companies to manufacture when and where needed.
Trend Micro Research Uncovers Lack of IoT Security Awareness
Only 14% of respondents say they have complete organizational awareness of IoT threats; 37% claimed they are not always able to define their security needs before implementing IoT solutions.
Sponsored Content
Data Protection in the Digital Thread
The Siemens and Identify3D technology suite protects confidentiality and integrity of data in the digital manufacturing thread, providing intellectual property protection, manufacturing repeatability and traceability to counter constantly evolving cybersecurity threats.
Industry Kicks off Cybersecurity Certification for IoT Devices
By offering cybersecurity certification for IoT devices, the program is designed to protect consumers and wireless infrastructure, while creating a more secure foundation for smart cities, connected cars, mHealth and other IoT applications.
New Cybersecurity Certification Program for IoT Devices
CTIA's cybersecurity certification program said to improve IoT security.
Engineering’s Link to Blockchain
The technology associated with cryptocurrency offers new approaches to data security and transaction record integrity.
Facing the Embedded Security Crisis
Defense from cyberattacks must begin with device design and embedded security.
Embedded Software: The Heart of the IIoT
The increasing momentum of the IIoT and the growing footprint of open-source software promise to foster the proliferation of embedded software-empowered intelligent devices and smart sensors.
DMDII Launches Cyber Hub for Manufacturing
DMDII's new cyber hub for manufacturing has support of Department of Defense; national hub will allow experimentation on cybersecurity technology for the factory floor.
CPU Design Flaw Leaves Billions of Devices Vulnerable to Attack
Make sure your engineering workstation and cloud services are patched against Meltdown and Spectre attacks.
Using Tech to Secure Tech
Security technology is constantly improving. But with data breaches making news with what seems to be increasing regularity, it’s understandable that many companies have second thoughts about making the leap into cloud computing or rolling out connected devices.
Pushing Security from the Cloud to Every Endpoint in Today’s IoT
As high value content now flows throughout the IoT, devices are saddled with communicating high-value information via an IoT connection. As a result, the security threat has greatly increased for all connected IoT devices.
Welcome: To Catch a Thief
The financial services industry uses technology against cybercriminals.
Computing Crime Fighters
Financial institutions turn to the real-time fraud detection capabilities enabled by high-performance computing to combat cybercriminals.



Latest News

Predicting Structural Instability Due to Plastic Hinge Collapse Mechanism
Designing structures based on conditions where loading results in full plastic yielding that creates structural instability where the structure collapses...

Volkswagen updates classic van with generative design, RoboCup flexes autonomous muscles, more
In this episode of DE Video News roundup, VW uses Autodesk Fusion to reshape Microbus, autonomous robots play soccer, Onshape...

Editor’s Picks: July 11-17, 2019
One of the picks will be chosen as DE’s Editor’s Pick of the Week.

HP Unveils New Performance Options for Z6 Workstations
New configurable options for Z6 G4 workstations feature Intel Xeon W CPUs that are designed for creative workloads like 3D...

All posts