qecdfeqvuwftcrz
|

prpl Security Group & Imperas Address IoT Security Challenges via Multi-Domain Virtualization

NO RATINGS
View comments: newest first | oldest first | threaded
Be the first to post a comment regarding this story.


More Blogs from The prpl Palette
Technology devices offer a wealth of possibilities for tech savvy owners keen to push their device capabilities to the limits. At the same time there are logical reasons why lawmakers and regulators need to lock down certain functionality.
Whether its in products as mundane as a WiFi router, or as forward thinking as drones and smart cars, the IoT is making its place in the world and regulators and consumers are at odds in terms of how best to regulate it.
As an industry, we need to start to address the security limitations inherent in the Internet of Things. A new hardware-led approach needs to be at the heart of the solution.
The Internet of Things is developing at such a rate that it threatens to outstrip our ability to adequately secure it...and that's potentially a huge problem.
Twitter Feed
EBN Online Twitter Feed

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EBN Dialogue / LIVE CHAT
EBN Dialogue enables you to participate in live chats with notable leaders and luminaries. Open to the entire EBN community of electronics supply chain experts, these conversations see ideas shared, comments made, and questions asked and answered in real time. Listed below are upcoming and archived chats. Stay tuned and join in!
Archived Dialogues
Live Chat 01/15: CPOs Re-Shape Their Business Roles
Increasingly chief procurement officers (CPOs) are re-shaping their organizational role to focus on creating results far beyond cost controls. A new IBM survey explores how.
Live Chat 11/12: Examining the Cyberthreat to Supply Chains
The number of cyberattacks is on the rise and hackers are targeting the supply chain. Drew Smith, founder and CEO of InfoArmor, will be on hand to discuss the reality of today's threat landscape and what to do about it.