Our Resources
Vivamus suscipit tortor eget felis porttitor volutpat. Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a.
5G and IoT Privacy and Security
In this Information Age article, Dr. Karpliuk provides several reasons for building security into IoT devices rather than trying to bolt it on...
21st Century Cures Act and Medical IoT
Several healthcare and health IT industry groups are asking congress to rethink privacy concerns under the 21st Century Cures Act. While the good...
Privacy and IoT
IoT devices are the glue to an interconnected world or things. In some cases those “things” can harvest, digest, store and share their data (which...
Reducing Medical IoT Related Risks
The Internet of Medical Things (IoMT) is part of, and a key enabler for the emerging field of “Digital Health.” While the field holds great promise...
Allegro Software Expands Secure IoT Suite Framework With Support For Quantum Entropy Generation from EYL Earns FIPS Validation From National Institute of Standards and Technology (NIST)
Allegro Software Expands Secure IoT Suite Framework With Support For Quantum Entropy Generation from EYL Earns FIPS Validation From National...
Hackers Attacking IoT Vulnerabilities
In November, 2016, Armis Security announced that approximately 20 million Amazon Echo and Google Home devices were vulnerable to attacks by a...
7 Key Elements of Proactive IoT Security
All types of Internet of Things (IoT) devices are under attack. They are routinely recruited as unwitting members of botnets used for Distributed...
Allegro Discusses IoT Identity with One World Identity Podcast
Allegro Software and One World Identity Discuss The Need For Strong IoT Identity One World Identity sat down with Allegro Software to discuss...
Allegro Software Expands FIPS Support For IoT Applications
Allegro Software Expands FIPS Support For IoT Applications Needing Validated Cryptography in Military, Medical and Federal Environments FIPS...
Let’s Talk IoT Security
Implementing IoT device security can be a challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design. Click the button below to schedule a one-on-one web conference to discuss your security needs.
 
				

