November 24, 2015
Achieving IoT security means addressing every link in the chain, from the quality of your application code to embedding a root of trust in the hardware.
May 24, 2014
IC designers are becoming increasingly worried about the possibility of third parties inserting malicious 'trojan' circuitry into their ICs.
April 1, 2011
As part of our utility metering focus, Sean Murphy offers a US perspective on the challenges.