Archive

Search Blog

Archive: May 2016
photo

Increasingly, enterprises are demanding hardware sourcing authentication as a way to prevent counterfeit components from creating vulnerabilities within networks or systems. Incidents like the recent revelation that Apple may have purchased compromised motherboards are the reason that sourcing information and verification of supply chain integrity are becoming mandatory for certain contracts.  Read More

photo

Security of IoT: Issues and Solutions

Posted on May 24, 2016
Category: Internet of Things

Any ISV considering IoT solutions or an enterprise wanting to take advantage of IoT solutions must be acutely aware that security is a fundamental piece of the solution. Not only could a potential exploit hurt product functionality and damage brand reputation, but it could also introduce network vulnerabilities to other connected server systems.  Read More


« Previous123456...29Next »