Sitara Processor Security

July 19, 2018

Computer security once meant annoying viruses on PCs. Then, the stakes increased. Hacking into business and government systems exposed personal and financial information to fraud, theft and embezzlement. Now though, the security of embedded systems—or, more accurately, the insecurity of embedded systems—poses a threat to very critical data. Today, the world runs on data and every bit or byte should be considered a potential target of attack.

Spotlight

sero security

Being a small, boutique operation allows us to invest time into researching, analysing and understanding new threats and vulnerabilities without having the burden of working in a large corporate environment. Our penetration testers are passionate about cyber security and work hard to build a strong knowledge base and stay ahead of the curve when it comes to the ever-evolving cyber threats – It’s in our blood! It’s what we do! We work independently of any security product vendors, which means we are able to offer completely unbiased advice that is tailored to your needs and requirements. We will never try to sell you anything.

OTHER WHITEPAPERS
news image

How Healthcare Can Boost Cyber Security and Close Its Defense Gaps

whitePaper | May 22, 2022

Hackers have made healthcare a top target. As a result, the healthcare industry experienced the highest number of ransomware attacks during Q3 2022, with one in 42 healthcare organizations suffering an attack – in spite of an 8 percent drop in ransomware attacks in Q3.

Read More
news image

Dashlane - Security White Paper August 2022

whitePaper | August 30, 2022

Access to the user’s data requires using the User Master Password which is only known by the user. It is used to generate the symmetric Advanced Encryption Standard(AES) 256-bit key for encryption and decryption of the user’s personal data on the user’s device. We useWebcrypto API for most browser based cryptography and the native libraries for IOS and Android.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More
news image

Dell PowerScale OneFS: Security Considerations

whitePaper | December 28, 2022

In the age of Digital Transformation, organizations must adapt to modern data requirements and implement new features for the transformation life cycle. Throughout this process, protecting data is vital as it is an organization’s most valuable asset. This document describes how to maintain an aggressive security posture for a PowerScale OneFS cluster and meet industry security requirements.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Intel® Converged Security and Management Engine (Intel® CSME) Security

whitePaper | October 26, 2022

Intel platforms are designed with a strong built-in security foundation. This allows the ecosystem partners to help protect the platform data and to build more trusted applications.

Read More

Spotlight

sero security

Being a small, boutique operation allows us to invest time into researching, analysing and understanding new threats and vulnerabilities without having the burden of working in a large corporate environment. Our penetration testers are passionate about cyber security and work hard to build a strong knowledge base and stay ahead of the curve when it comes to the ever-evolving cyber threats – It’s in our blood! It’s what we do! We work independently of any security product vendors, which means we are able to offer completely unbiased advice that is tailored to your needs and requirements. We will never try to sell you anything.

Events