Building NFC Readers Choosing the Right Chip and Implementation Tips
Blog Post

Building NFC Readers: Choosing the Right Chip and Implementation Tips

Wondering how to select near-field communication (NFC) readers for your IoT system development? From choosing the right NFC chip to a successful implementation, this third part of our NFC technology blog series, is full of pro tips to get you started.
NFC Reader Design Essentials Requirements for Tags and Receivers
Blog Post

NFC Reader Design Essentials: Requirements for Tags and Receivers

In the second installment of our series on NFC technology, our engineer shares advice on defining design requirements for NFC readers and requirements for NFC tags and receivers. Learn how the availability of low-cost and extremely useful test gear have made implementation easier.
Counterfeit Protection Exploring the Role of NFC in the IoT
Blog Post

Counterfeit Protection: Exploring the Role of NFC in the IoT

From enabling secure, tap-and-go transactions to driving innovative IoT applications, NFC is now a ubiquitous force in our lives. But as the threat of counterfeiting and gray market products looms large, learn how NFC technology combats these challenges.
Wondering how to select near-field communication (NFC) readers for your IoT system development? From choosing the right NFC chip to a successful implementation, this third part of our NFC technology blog series, is full of pro tips to get you started.
In the second installment of our series on NFC technology, our engineer shares advice on defining design requirements for NFC readers and requirements for NFC tags and receivers. Learn how the availability of low-cost and extremely useful test gear have made implementation easier.
From enabling secure, tap-and-go transactions to driving innovative IoT applications, NFC is now a ubiquitous force in our lives. But as the threat of counterfeiting and gray market products looms large, learn how NFC technology combats these challenges.
CSIS podcast on Remote Surveillance Camera design
Blog Post

Our Remote Surveillance Camera Innovations Highlighted on Recent Podcast

The future of investigative surveillance is now. Join us as our client Dan Coleman of Creative Solutions Investigative Services discusses rewriting the rules of surveillance technology on the Revenue Fuel podcast.
software bill of materials
Blog Post

SBOM (Software Bill of Materials): Strengthening Security through Software Transparency

Learn how an SBOM — or software bill of materials — enhances software security, manages supply chain risks and boosts digital product integrity.
Mobile App Security: Safeguarding User Data and Privacy
Blog Post

Mobile App Security: Safeguarding User Data and Privacy

Staying ahead of bad actors and protecting your mobile app from vulnerabilities in the ever-evolving threats landscape remains difficult. Learn why mobile app security is important, the most common threats and best practices for enhancing your mobile app development.
The future of investigative surveillance is now. Join us as our client Dan Coleman of Creative Solutions Investigative Services discusses rewriting the rules of surveillance technology on the Revenue Fuel podcast.
Learn how an SBOM — or software bill of materials — enhances software security, manages supply chain risks and boosts digital product integrity.
Staying ahead of bad actors and protecting your mobile app from vulnerabilities in the ever-evolving threats landscape remains difficult. Learn why mobile app security is important, the most common threats and best practices for enhancing your mobile app development.
Blog Post

Top 10 IoT Security Vulnerabilities

Considering the ubiquity of the Internet of Things, IoT security has taken on increased importance in our connected, data-driven world. In this informative blog post, our security expert lays out the top 10 vulnerabilities IoT systems face so that you can remain as protected as possible.
Blog Post

Embedded Security and the Top Properties of a Secure System

With the IoT becoming ever-present in our lives, embedded security has taken on increased importance in a world in which data is a valuable currency. This blog post defines the challenge and highlights the top 10 characteristics of a secure system.
IoT security standards
Blog Post

Leveraging IoT Security Standards to Help Ensure Embedded Security

With IoT devices continuing to become ubiquitous, it’s vital that manufacturers, service providers, app developers and retailers understand the many IoT security standards and data privacy laws and regulations impacting the Internet of Things.
Considering the ubiquity of the Internet of Things, IoT security has taken on increased importance in our connected, data-driven world. In this informative blog post, our security expert lays out the top 10 vulnerabilities IoT systems face so that you can remain as protected as possible.
With the IoT becoming ever-present in our lives, embedded security has taken on increased importance in a world in which data is a valuable currency. This blog post defines the challenge and highlights the top 10 characteristics of a secure system.
With IoT devices continuing to become ubiquitous, it’s vital that manufacturers, service providers, app developers and retailers understand the many IoT security standards and data privacy laws and regulations impacting the Internet of Things.
Blog Post

How Katalon Studio Makes Test Automation Easier

Katalon takes the need for learning to program or even the complicated setup of all the tools needed to run a test script and throws it all in a one-stop shop that can be picked up by anyone of any technical skill level in short order to create automation.
Josh Datko
Blog Post

Meet Embedded Device Security Webinar Panelist Josh Datko

Josh Datko is the founder of Cryptotronix, co-founder of Keylabs, Inc. and a panelist on our July 15th end-to-end product security webinar. Get to know Josh and register to hear advice for building security into every aspect of an embedded device.
Cardinal Peak logo placeholder
Blog Post

What is the Weakest Link in Your IoT Product Security Chain?

Even the simplest connected device provides a broad range of attack surfaces. Weak security can result in a compromised product, exposed data, downtime and significant damage to a company’s reputation.
Katalon takes the need for learning to program or even the complicated setup of all the tools needed to run a test script and throws it all in a one-stop shop that can be picked up by anyone of any technical skill level in short order to create automation.
Josh Datko is the founder of Cryptotronix, co-founder of Keylabs, Inc. and a panelist on our July 15th end-to-end product security webinar. Get to know Josh and register to hear advice for building security into every aspect of an embedded device.
Even the simplest connected device provides a broad range of attack surfaces. Weak security can result in a compromised product, exposed data, downtime and significant damage to a company’s reputation.