The smart home continues to evolve in available functions and complexity as several different connectivity protocols from numerous suppliers target a variety of products for use in smart homes.
Security will deliver consumer confidence
Upcoming workshop goes through many of the details behind securing your sensor nodes, particularly in industrial environments.
Trusted Computing Group has developed a guidance document for networked equipment security. For example, how a TPM can establish device ID with private keys stored inside the tamper-resistant TPM.
With the goal of enabling and accelerating the industrial Internet of Things (IIoT), the Industrial Internet Consortium (IIC) has placed security high...