Metal Credit Cards, IoT, AI, and More: This Week’s Top Mobile ID Stories
Biometric payment cards are often featured in our weekly roundups of Mobile ID World’s most popular stories, but this week brings us a couple of […]
Biometric payment cards are often featured in our weekly roundups of Mobile ID World’s most popular stories, but this week brings us a couple of […]
The FIDO Alliance is teaming up with the IoT Security Foundation (IoTSF) in an effort to promote IoT security. The collaboration will focus primarily on […]
The NIST has released four new documents to promote IoT security at the federal level. In that regard, the documents seek to establish a uniform […]
The C-Trust security tool from IAR Systems will now offer support for NXP’s LPC55S6x MCUs. The MCUs are based on Arm Cortex-M33 technology, and will […]
Thales has teamed up with a trio of other companies to develop a new IoT security solution. The company’s IoT SAFE application is compliant with […]
The Monnit Corporation has released a new data authentication platform designed specifically for low-power wireless sensors in IoT devices. The platform has been dubbed SensorPrints, […]
Google has announced that users of its Nest products will soon be required to activate two-factor authentication for their accounts, stepping up security in Google’s […]
A team of researchers from software company Check Point have released a report that highlights a potential security flaw in the Philips Hue smart bulbs. […]
Trustonic has found another customer for its Trustonic Secured Platform for IoT devices. The company has announced that the medical equipment company OPTOLANE will be […]
NEC Asia Pacific has teamed up with a US-based network security firm to help shore up the defenses of its smart city platform. The company […]
Casio has turned to Trustonic to safeguard its latest smartwatch. Built specifically for athletes and outdoor adventurers, the Casio PRO TREK Smart WSD-F21HR debuted in […]
“… SecurID authentication solutions like biometrics and push notifications can now be extended to the kinds of vulnerable IT infrastructure that Silverfort seeks to secure.” […]
Follow Us