How encryption can be the answer to cybersecurity and business development in the complex world of digital transformation, regulations and cyber threats.

The beauty of encryption is in the simplicity of its approach. Security is applied directly on the data itself, not to the network perimeter, d...

Wednesday, August 16, 2017 News , Security , Technology

A take on the evolution of cloud security, and what HYKER brings.

In 2000 most control and data was safely maintained within organizational borders using firewalls etc. Data never left the protected boundaries.

In 2010 the cloud had become a viable outsourcing option. Organizations need to trust...

This is a guest post by Jonathan Fries of Exadel.

Originaly published in TechTarget.

Recently, at Exadel, we encountered an interesting challenge for IoT developers. Because IoT apps have gained so much momentum, there is more and more choice in how to develop them. For device communication, two ...

Thursday, November 10, 2016 Security , Technology

This post is an adaptation from a blog post by HYKER Security Lead Joakim.

Introduction

The Internet of Things (IoT) is coming.
With it comes new security challenges from the constrained and asynchronous nature of IoT.

IoT is a wide term used to describe anything from industrial control systems t...

Friday, September 16, 2016 Internet of Things , Security , Technology

Our “6 Iot Security Fundamentals That Need To Be Solved” presentation at the IoT conference in Lund:

6 Iot Security Fundamentals That Need To Be Solved from Øredev Conference on Vimeo.

Internet of Things is still very immature. There is not even a consensus in what it means. It covers many diffe...