Protecting Industrial Infrastructure with NIS2
The EU's NIS2 regulations aim to secure operational technology in the same way that the original NIS1 regulations did for information technology.
Read Article
The EU's NIS2 regulations aim to secure operational technology in the same way that the original NIS1 regulations did for information technology.
Read Article
AI is transforming cybersecurity to be more dynamic with real-time threat detection and automated incident response.
Read Blog
Zero trust architecture secures modern networks by verifying identity, limiting access, and continuously monitoring every connection.
Read Article
Malicious actors are leveraging the power of Generative AI, meaning cybersecurity professionals must use AI to shield against attacks.
Read Blog
Engineers are implementing changes to the IoT to make it more resilient by ensuring that problems are isolated to prevent widespread failure.
Read Blog
With increasing urbanization, digitalization and data processing pave the path to optimizing scarce resources, but increased cyberattack risks arise.
Read Blog
Learn how to configure the NXP FXLS8974CF accelerometer and NMH1000 magnetic switch for tampering or theft detection.
Read Article
Chip makers are enhancing IoT security with MCU hardware features, giving developers new techniques to harden their products against malicious attacks.
Read Blog
Since quantum computers will easily break current cryptography keys, engineers are developing PQC algorithms that tomorrow’s computers can’t break.
Read Blog
Encryption protects data from hackers, unless they gain the cryptographic key. Hardware security modules ensure keys remain secure.
Read Blog
Learn how identity governance, micro-segmentation, and automation are all important in implementing zero trust architectures (ZTAs) for enhanced network security.
Read Blog
Digital content is removed from the internet as easily as it’s published. Here’s why you should take steps to keep your digital library secure.
Read Blog
Learn about a decentralized security approach based on zero-trust principles, security by design, and threat intelligence and monitoring.
Read Blog
This article explores a decentralized security framework for embedded devices, focusing on confidentiality, integrity, and availability.
Read Article
To enhance security in embedded hardware solutions, developers are exploring the STM32Trust for comprehensive defense-in-depth design strategies.
Read Blog
With human errors posing the biggest vulnerabilities in cybersecurity, understanding authentication best practices has never been so important.
Read Article
Industry experts discuss embedded security, focusing on edge data protection, including secure management, trusted operations, and IT/OT convergence.
Read eBook
More connected devices create more endpoints for cybersecurity threats and the need for strict cyber hygiene.
Read Article
Products that help obtain and process biometric data show great promise in future consumer devices.
Read Article
In this episode of Chalk Talk, Amelia Dalton and Antje Schutz from NXP explore NXP’s EdgeLock Secure Element and Secure Authenticator Solution.
Watch Video
Loading More...