Come with us on a field trip to ZfE Graz
Register now!
The leaders of the United States and China both participated in the recently held APEC Summit in Peru, with artificial intelligence dominating headlines again.
Diese 3 Fragen gehören auf die Liste jedes CISO. Im Juli erlebte die Wall Street ihren schlimmsten Tag seit 2022, als der technologieorientierte Nas
As the EU harmonizes cybersecurity standards, post-quantum security must be a top priority
As the Internet of Things (IoT) continues to grow, so do the security risks associated with Low-Power Wide-Area (LPWA) networks. These networks, which enable long-range communication with minimal energy requirements, are vulnerable to physical tampering and cyberattacks. To mitigate these risks, hardware security modules (HSMs) play a critical role in securing LPWA IoT networks by securely generating, storing, and managing cryptographic keys. In ruggedized LPWA IoT environments, HSMs must be placed in secure locations to resist physical tampering attempts. However, with many devices processing and transmitting sensitive information, security systems are essential to protect the integrity and privacy of IoT data. The use of HSM tamper-proof technology is also crucial, as it ensures that cryptographic keys and operations remain secure even under physical attack. Furthermore, quantum cryptography offers a robust solution for network and data security in LPWA IoT environments. By using quantum key distribution (QKD) technology, organizations can securely distribute cryptographic keys between devices, ensuring that communication remains secure even in the face of cyber threats. This is particularly important in industries such as finance, healthcare, and government, where sensitive information must be protected at all costs. Implementing operational strategies that take into account device placement, power management, and communication protocols is also essential to ensuring the security of HSMs in ruggedized LPWA IoT settings. By leveraging HSMs with tamper-proof technology and quantum cryptography, organizations can ensure that their sensitive data remains secure even in the face of increasing cyber threats.
(Bild: Dall-E / KI-generiert) Entdecken Sie die kritische Sicherheitslücke CVE-2024-38094 in SharePoint, die Remote-Code-Ausführung ermöglicht und wie Microsoft mit Updates reagiert.
NXP Semiconductors has announced its new i.MX 94 family of applications processors, designed to provide safe and secure connectivity for industrial and automotive edge applications. The i.MX 94 family combines real-time processing with support for industrial networking protocols, including Ethernet time-sensitive networking (TSN) switch, making it the first applications processor family to integrate such a feature. According to Charles Dachs, Senior Vice President and General Manager of Industrial and IoT at NXP, "The i.MX 94 family delivers the high-performance edge processing needed for today's industrial automation, as well as automotive telematics applications, with the advanced networking, security, safety, and AI capabilities needed to enable tomorrow's innovations." The new processor family also integrates post-quantum cryptography (PQC) to protect against quantum compute attacks, making it NXP's first applications processor family to do so. Additionally, the i.MX 94 family features an integrated eIQ Neutron Neural Processing Unit (NPU) for AI and machine learning capabilities.
(IN BRIEF) The European Investment Fund (EIF) has committed €90 million to three venture capital funds focused on accelerating the growth of tech start-up
(Bild: frei lizenziert) Die Umsetzung von NIS2 und CRA stellt die deutsche Elektronikindustrie vor Herausforderungen. Erfahren Sie mehr über das Ausmaß und die Auswirkungen dieser Vorschriften.
(Bild: Dall-E / KI-generiert) Eine Sicherheitslücke im AWS Cloud Development Kit ermöglicht die Übernahme von AWS-Accounts. Erfahren Sie mehr über die Risiken und wie Sie sich schützen können.
Publication date: Available online 9 November 2024Source: Expert Systems with ApplicationsAuthor(s): Navid Aftabi, Nima Moradi, Fatemeh Mahroo, Farhad Kianfar
Anzeige / WerbungCybersecurity-Markt für KI-Quantenkryptografie kann sich laut einer Studie in den kommenden Jahren verzehnfachen!ADVERTORIAL |WERBUNG (Auftraggeber: Scope Technologies) - Interessenkonflikte
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is
Upwind seeks to streamline the overwhelming volume of alerts generated by threat detection tools, aiming to reduce them by 90%.
%
Corgea, a CyberTech specialising in AI-driven vulnerability detection and remediation, has closed a $2.6m seed funding round.
(Bild: paripat - stock.adobe.com) Unternehmen investieren in KI und Cybersecurity, um IT-Prozesse zu optimieren und Cyberbedrohungen abzuwehren. Erfahren Sie, wie diese Technologien zum Geschäftserfolg beitragen.
The acquisition price has not been disclosed, but it is estimated at $300 million, which represents a handsome return for investors in the Tel Aviv-based startup. After acquisitions by Palo Alto Ne…
Machine learning (ML) is changing cybersecurity by enabling progressed discovery, anticipation and reaction instruments. This paper gives a comprehensive survey of ML's part in cybersecurity, looking at both hypothetical systems and down to earth usage. It diagrams the rising dangers focusing on ML models, such as ill-disposed assaults, information harming and show reversal assaults and examines state-of-the-art defense procedures, counting ill-disposed preparing, vigorous models and differential protection. Furthermore, the paper investigates different ML applications in cybersecurity from interruption location to malware classification, highlighting their affect on improving security measures. An peculiarity induction calculation is proposed for the early discovery of cyber-intrusions at the substations. Cybersecurity has ended up a imperative investigate range. The paper concludes with a discourse on the key inquire about bearings and best hones for making secure and versatile ML frameworks in a data-driven world. This paper dives into how Machine Learning (ML) revolutionizes cybersecurity, enabling progressed discovery, avoidance, and reaction components. It offers a exhaustive investigation of ML's urgent part in cybersecurity, enveloping hypothetical systems and viable applications. It addresses rising dangers like ill-disposed assaults and information harming, nearby cutting-edge defense techniques such as antagonistic preparing and strong models.
This chapter highlights the transformation of secure communications throughthe incorporation of quantum mechanics. Over the past four decades, thisgroundbreaking theory has quietly revolutionized private communication. Thechapter provides a concise historical overview of this field's inception,tracking the development of its pioneering protocol, BB84. It delves deeplyinto the protocol's evolution, spotlighting its milestones and challenges.Furthermore, it offers a panoramic view of the entire quantum key distributionlandscape, encompassing continuous variable protocols designed to harnessexisting telecom technologies and device-independent quantum key distributionprotocols aimed at achieving secure key exchange with minimal reliance on theexperimental setup.
Monatelange Spionage enthüllt Schwächen in der Infrastruktur. Angreifer sollen sensible Daten hochrangiger Politiker und Beamter erbeutet haben
Infineon has added post-quantum cryptography support to 28nm 500MHz automotive processors. Called Aurix TC4Dx, they are rated for ISO/SAE21434 cyber
Zudem haben die Strafverfolger mehrere Server beschlagnahmt und insgesamt 41 Personen verhaftet. Gegen weitere 65 Tatverdächtige wird noch ermittelt. (Cybercrime, Virus)
(Bild: Dall-E / KI-generiert) Entdecken Sie die Cybersecurity-Herausforderungen von 2025 und lernen Sie, wie Ihr Unternehmen sich gegen Ransomware, Phishing und KI-Angriffe schützen kann.
Mit einem neuen Update für seine Galaxy-Smartphones schließt Samsung gleich dutzende Sicherheitslücken. Hier erfahren Sie, was sonst noch im Update steckt.