Protecting your data and devices begins with encryption. This process ensures privacy, authenticity and security in communication. This overview provides you with the information you need to understand the various device-level encryption options.
Archived Feature ArticlesArticles
A study shows that 70% of popular IoT devices are easily hackable. With these security concerns, finding solutions to protect devices and data is key. Learn more about the benefits of adopting a multilayered approach into IoT solutions from the outset of the design and development.
With all of the benefits of a connected world, one negative remains the new opportunities for hackers to steal IP and invade privacy. Some of the largest challenges in the IoT today are enabling robust security for low-end devices and simplifying implementation for OEMs. Learn how to face these issues head on.
The IoT has fundamentally influenced the way we do business. And in this age of connected people, places and things, protecting your network is no easy feat. Find out how blockchain technology coupled with a secure cloud platform are meeting the unique security needs of the IoT.
Today’s cars are not the same Model T’s that rolled off the assembly line in 1908. Between having microcontrollers in the body and powertrain, our vehicles now are more like cloud-connected computer networks on wheels. Understanding the security threats facing these systems helps protect consumers.
The Internet of Things is growing. What else is growing along with it? Security risks. The concerns to consider are great and make it complicated to select the right solution. To protect your designs, you need a solution that secures from the device level out to the Cloud. Find out how companies can keep the new IoT frontier safe.
The use of LEDs has grown to span across a range of applications—from white goods, to automotive, to amusement parks—and dedicated LED drivers are required for backlighting and graduation control. Take a look at the features and benefits of using these devices.
Securing for the Industrial Internet of Things (IIoT) poses unique challenges, vulnerabilities and considerations. New approaches are necessary. Find out what dangers threaten your data and how to protect your IIoT solutions.
Design Trade-Offs of Using Precision SAR and Sigma-delta Converters for Multiplexed Data Acquisition Systems
The multiplexed data acquisition systems (DAS) utilized in various applications, such as industrial process control, portable medical devices and automated test equipment, present unique design considerations. Learn about the trade-offs to create your own pro/con list.
Bluetooth® may have started with audio streaming and hands-free applications like speakers and headsets, but enhancements have widened its net to home, building and even some industrial applications. Find out how the new BLE modules have evolved.