2020-04-07 - Junko Yoshida

Securing API to Protect Your Car-Key Apps

There are too many ways to hack the API of a car-key app. CriticalBlue has a solution for that...

2020-02-12 - Anne-Françoise Pelé

Finding Value in the Audio Chain

The emergence of silicon-based microphones has reshaped the audio landscape. But in the coming years, market research firm Yole Dévelopment…

2020-01-20 - Junko Yoshida

Startup De-Identifies Data

DeCloak developed a chip to de-identify individuals’ private data. The technology lets data aggregation/analysis companies see the forest without seeing…

2019-11-07 - Luffy Liu, EETimes China

Innovation or Exploitation?

China abruptly banned the use of headbands to monitor school children in a classroom, after the Western media's coverage caused…

2019-10-03 - Matthew Burgess

Should AI Applications Be a Matter of Ethics?

Have European concerns surrounding data privacy enabled AI R&D in the region to carve out its niche in the market?

2019-07-08 - Nitin Dahad

‘Unhackable’ Microprocessor to Secure Encrypted Data

The co-processor uses partially homomorphic encrypted execution. Since the data is never decrypted, it remains secure.

2019-07-03 - Pamela Passman

Blog: Cybersecurity & Privacy at a Crossroads

The combination of the headline worthy data breaches and new privacy legislation have put data protection and privacy on the…

2019-06-27 - Sally Ward-Foxton

Facial Recognition: The Reality

AI is making automated facial recognition for mass surveillance a reality - but at what cost?

2019-06-21 - Barbara Jorgensen

Grappling with Security & Privacy in the Digital Age

In the midst of the digital revolution, the stakes for electronics distributors trying to safeguard the privacy and security of…

2019-04-02 - David Benjamin

Privacy or Convenience?

There's a famous tale from a long time ago of a little guy beating a giant. Now tiny Qwant is…