Our Resources
Vivamus suscipit tortor eget felis porttitor volutpat. Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a.
IoT and Cloud Security Trends for 2021
IoT technology is dramatically impacting our everyday lives. Cloud computing is simplifying the management of IT infrastructures and reducing costs....
Podcast: IoT Cybersecurity Improvement Act 2020
The intent of the IoT Cybersecurity Improvement Act 2020 is to ensure IoT technologies purchased and deployed by the U.S. Government meet...
United States Federal Government Passes First IoT Security Legislation
The United States Federal Government has passed the first Internet of Things (IoT) legislation that prohibits federal agencies from purchasing IoT...
Allegro Software Expands IoT Edge Framework with Support for TLS 1.3
Allegro Software Expands IoT Edge Framework with Support for TLS 1.3 Securing IoT edge devices with the latest advanced data-in-motion encryption...
Allegro Software Announces TLS API Compatibility Layers to Speed IoT Development with TLS v1.3 and FIPS
Allegro Software Announces TLS API Compatibility Layers to Speed IoT Development with TLS v1.3 and FIPS API compatibility with ARM’s Mbed TLS and...
IoT, PKIs and Roots of Trust
The recently released 2019 Global PKI and IoT Trends Study reinforces the use of PKI for generating secure roots of trust in IoT applications....
IoT Tech Expo Presentation Slides
Smart IoT Security Deriving Business Value from Secure Connected Intelligence Wednesday, November 13, 2019 - Allegro's presentation at the IoT Tech...
5G and IoT Privacy and Security
In this Information Age article, Dr. Karpliuk provides several reasons for building security into IoT devices rather than trying to bolt it on...
21st Century Cures Act and Medical IoT
Several healthcare and health IT industry groups are asking congress to rethink privacy concerns under the 21st Century Cures Act. While the good...
Let’s Talk IoT Security
Implementing IoT device security can be a challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design. Click the button below to schedule a one-on-one web conference to discuss your security needs.