Our Resources
Vivamus suscipit tortor eget felis porttitor volutpat. Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a.
Podcast: IoT Cybersecurity Improvement Act 2020
The intent of the IoT Cybersecurity Improvement Act 2020 is to ensure IoT technologies purchased and deployed by the U.S. Government meet...
United States Federal Government Passes First IoT Security Legislation
The United States Federal Government has passed the first Internet of Things (IoT) legislation that prohibits federal agencies from purchasing IoT...
Allegro Software Expands IoT Edge Framework with Support for TLS 1.3
Allegro Software Expands IoT Edge Framework with Support for TLS 1.3 Securing IoT edge devices with the latest advanced data-in-motion encryption...
Allegro Software Announces TLS API Compatibility Layers to Speed IoT Development with TLS v1.3 and FIPS
Allegro Software Announces TLS API Compatibility Layers to Speed IoT Development with TLS v1.3 and FIPS API compatibility with ARM’s Mbed TLS and...
IoT, PKIs and Roots of Trust
The recently released 2019 Global PKI and IoT Trends Study reinforces the use of PKI for generating secure roots of trust in IoT applications....
IoT Tech Expo Presentation Slides
Smart IoT Security Deriving Business Value from Secure Connected Intelligence Wednesday, November 13, 2019 - Allegro's presentation at the IoT Tech...
5G and IoT Privacy and Security
In this Information Age article, Dr. Karpliuk provides several reasons for building security into IoT devices rather than trying to bolt it on...
21st Century Cures Act and Medical IoT
Several healthcare and health IT industry groups are asking congress to rethink privacy concerns under the 21st Century Cures Act. While the good...
Privacy and IoT
IoT devices are the glue to an interconnected world or things. In some cases those “things” can harvest, digest, store and share their data (which...
Let’s Talk IoT Security
Implementing IoT device security can be a challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design. Click the button below to schedule a one-on-one web conference to discuss your security needs.