Expert insights

The Internet of Things (ioT) connects the real with the digital world and is one of the most important technology trends of our time – as the number of devices within the IoT grows with each passing day, so too does the number of potentially accessible nodes. Hence protecting data and devices is vital in the face of a growing threat landscape.

"The targets of the Cyber Security Act are confidentiality, integrity and availability", Dr. Detlef Houdeau, Senior Director, Connected Secure Systems.

Regulation, standardization & certfication of IT, ICT and IoT products and systems

What is the status of regulation, standardization & certfication of IT, ICT and IoT products and systems in the European Economic Area? What is the scope of the EU Cybersecurity Act? Which are the currently used security standards for CE products? Detlef Houdeau, Infineon’s security expert for public policy, gives a comprehensive overview of all existing and upcoming regulations, termini and standards with which device manufacturers should be familiar.

Take a look at the video on Regulation, Standardisation and Certification of IT, ICT and IoT products and systems in the EEA here.

 

"Nobody can say exactly when and if the quantum computer will arrive", Thomas Pöppelmann, Researcher, Infineon Technologies.

What you need to know about the future of encryption

The quantum computer enjoys the aura of a super computer that will shoot us into the next age of IT and is able to crack even the most robust of codes in a flash. Quantum-safe cryptography is often called post-quantum cryptography (PQC).

PQC comprises publickey encryption or digital signature algorithms that rely on the hardness of sophisticated mathematically problems. It is assumed that these problems are even intractable for powerful quantum and classical computers. To facilitate the development of new quantum-safe and practical schemes the National Institute of Standards and Technology (NIST) has started a standardization process.

Learn how standardization processes help preparing today for the potential danger of tomorrow here.

"There is no one-size-fits-all solution,” says Cristina DeLera, Senior Director of Infrastructure and Device Security, Infineon Technologies.

3 tips for securing IoT strategies:

  1. Securing your IoT solution/strategy is a vital necessity. Security must become a number one priority and be integrated from the beginning.

  2. Building trust between IoT devices is the first step in a holistic strategy. IoT devices need strong, tamper-resistant protection. This degree of protection cannot be provided by software alone – it needs hardware-based security.

  3. We recommend a security solution which is optimized for IoT devices and use cases and helps to overcome typical business and operational challenges.

More insights are available here.



 

Recent numbers of growing cyberattacks are raising alarms

Since 2014, the number of attacks on global organizations has increased by almost 50 percent. By looking at the consequences of these cyberattacks, we can quickly realize that without security, digital technologies would not have broader acceptance for a longer period of time.

With the right level of security we can avoid information loss, business disruption and other grave impacts.