The Internet of Things (IoT) is here. Everyday some new product is introduced adding to the wide diversity of IoT choices. They are not all the same. Many are limited in interoperability.
Read MoreAt the recent virtual conference 'WorksWith', Silicon Labs was joined by the ioXt Alliance to introduce the new regulatory requirements coming in to help protect IoT devices from those with malicious intent.
Read MoreIn this podcast, David is joined by Brad Ree (CTO of the IoXT Alliance) to talk more about their journey to make IoT more secure for consumers. They also talk about the partnership between PSA Certified and IoXT Alliance and how it’s easing fragmentation in the IoT ecosystem.
Read MoreThe chamber unanimously passed without amendments the Internet of Things Cybersecurity Improvement Act of 2020, the latest iteration of legislation that's been in the works for three years. It was approved by the House of Representatives on Sept. 14.
Read MoreThe IoT is rapidly growing and making an impact across most homes, buildings, cities and people around the globe. As the industry continues to connect and deliver intelligence to millions – and soon, billions – of things across the planet, consumers, manufacturers, ecosystems and standards organizations are asking important questions about security.
Read MoreThe ioXt Alliance, the Global Standard for IoT Security, announced the appointments of Facebook Reality Labs Security Partners Marcus Hodges and Ryan Nakamoto to the ioXt Board of Directors.
Read MoreThe ioXt Alliance is a group of manufacturers, industry alliances, and government organizations dedicated to harmonizing best security practices and establishing testable standards that give retailers and consumers product confidence in a highly connected world.
Read MoreOperational technology (OT), IoT and Internet of Medical things (IoMT) have been shaping productivity for decades, and each device is becoming ‘smarter’ with every release.
Read MoreThere are many challenges facing embedded development engineers tasked with implementing effective security measures. Knowledge of what is being protected, the threat landscape, and specific attack vectors to be protected against is necessary.
Read More