cyberyecurity-handstogehter.png
cyberyecurity-handstogehter.png
cyberyecurity-handstogehter.png

Cyberthreats are constantly evolving in order to take advantage of increased digitalization and connectivity. As governments, politicians, businesses and schools will come to rely on online connectivity and virtual communications tools they will be increasing their vulnerabilities and presenting more opportunities for cybercriminals to exploit.

Most of the consumers are left alone with evaluating security of devices, keeping security updated or changing passwords. And even businesses do not always have the know-how to evaluate security of tools they are using.

Defining minimum security requirements for connected devices is therefore a first and important step to increase cybersecurity. Considering security from the very beginning is key for digital products and business applications.

Secondly, cybersecurity should be as self-evident as safety. This can only be achieved through the definition of international standards, reliable testing and certification of products and the labelling of their security features.

With its security expertise, system understanding and decades of experience in the security arena, Infineon is shaping the market through close cooperation with public authorities, as well as worldwide umbrella organizations focused on cybersecurity. As one of the first players in the electronics supply chain, Infineon provides the building blocks that will subsequently enable devices and services to be securely and reliably connected. Our state-of-the-art semiconductor technologies are already building a solid and trusted foundation for everything from connected cars through smart homes to automated factories.

Find out more about our product portfolio.

 Infineon-contribution-to-the-security-market.png
 Infineon-contribution-to-the-security-market.png
 Infineon-contribution-to-the-security-market.png
GenevaRoadshow.jpg
GenevaRoadshow.jpg
GenevaRoadshow.jpg

You would like to join lively discussion with cybersecurity experts? The Charter of Trust Geneva Online Roadshow is fully packed with interesting impulses

The virtual Geneva Roadshow will be introduced by Frankie Ng, CEO of SGS, who will underline the importance of the Charter of Trust and its raison d’être in an uncertain world. Florian Schütz, the Swiss Federal Cyber Security Delegate will hold a keynote speech on the Swiss Cybersecurity Strategy. Charter of Trust experts will focus on the Charter’s Principle 2 “Responsibility throughout the digital supply chain” and Principle 8 “Transparency and response”, highlighting how Charter of Trust members implement internal and external processes to strengthen cybersecurity.

The Charter of Trust is a global cybersecurity initiative aiming at building trust in the digital economy and improving safety in a hyperconnected world. Leveraging over 30 years of experience, Infineon is an active member of the Charter of Trust and helping to securely connect people, organizations and things.

The Internet of Things (ioT) connects the real with the digital world and is one of the most important technology trends of our time – as the number of devices within the IoT grows with each passing day, so too does the number of potentially accessible nodes. Hence protecting data and devices is vital in the face of a growing threat landscape.

Detlef Houdeau
Detlef Houdeau
Detlef Houdeau

What is the status of regulation, standardization & certfication of IT, ICT and IoT products and systems in the European Economic Area? What is the scope of the EU Cybersecurity Act? Which are the currently used security standards for CE products? Detlef Houdeau, Infineon’s security expert for public policy, gives a comprehensive overview of all existing and upcoming regulations, termini and standards with which device manufacturers should be familiar.

Take a look at the video on Regulation, Standardisation and Certification of IT, ICT and IoT products and systems in the EEA here.

Thomas Poeppelmann
Thomas Poeppelmann
Thomas Poeppelmann

The quantum computer enjoys the aura of a super computer that will shoot us into the next age of IT and is able to crack even the most robust of codes in a flash. Quantum-safe cryptography is often called post-quantum cryptography (PQC).

PQC comprises publickey encryption or digital signature algorithms that rely on the hardness of sophisticated mathematically problems. It is assumed that these problems are even intractable for powerful quantum and classical computers. To facilitate the development of new quantum-safe and practical schemes the National Institute of Standards and Technology (NIST) has started a standardization process.

Learn how standardization processes help preparing today for the potential danger of tomorrow here.

Cristina Delera
Cristina Delera
Cristina Delera

Securing your IoT solution/strategy is a vital necessity. Security must become a number one priority and be integrated from the beginning.

Building trust between IoT devices is the first step in a holistic strategy. IoT devices need strong, tamper-resistant protection. This degree of protection cannot be provided by software alone – it needs hardware-based security.

We recommend a security solution which is optimized for IoT devices and use cases and helps to overcome typical business and operational challenges. More insights are available here.

Since 2014, the number of attacks on global organizations has increased by almost 50 percent. By looking at the consequences of these cyberattacks, we can quickly realize that without security, digital technologies would not have broader acceptance for a longer period of time.

With the right level of security we can avoid information loss, business disruption and other grave impacts.

infineon-cybersecurity-infographic.jpg
infineon-cybersecurity-infographic.jpg
infineon-cybersecurity-infographic.jpg

Downloads

embeddedsecurity.jpg
embeddedsecurity.jpg
embeddedsecurity.jpg

Cloud computing provides the tools and technologies to build data-intensive applications more affordable than traditional techniques. With millions of devices connected to the IoT, both manufacturers and consumers need to be sure that the identity of each and every device is genuine. Trusted device identities form the very basis for secured cloud connectivity and cloud computing. Therefore device identities need the best protection possible. Find out how Infineon improves cloud security.

In our fast moving world automation and interconnectivity are gathering pace. The entire value chain in the industry 4.0 is digitally connected, constantly supplying data and optimizing itself. Production is made faster, more efficient and more flexible. The urgency of Industrial Internet of Things (IIoT) security is becoming more and more apparent. It’s clear that security has come to the top of the agenda as a result of many high-profile cyberattacks.

Find out how Infineon enables the fourth industrial revolution.

embeddedsecurity.jpg
embeddedsecurity.jpg
embeddedsecurity.jpg
smart-home-cybersecurity-.jpg
smart-home-cybersecurity-.jpg
smart-home-cybersecurity-.jpg

Smart Home demands for intelligent devices that are equipped with sensors, controllers, actuators and security. This means they can collect, interpret and process data and then trigger appropriate actions or responses - all within a secured environment. Interoperability and communication between the devices and systems are prerequisites. Infineon is in the position to guide partners through this exciting new market while they can explore new opportunities and business models.

Cars are evolving fast. They are becoming digitized, connected and operate no longer as isolated vehicles. Already today, cars communicate with their environment, their passengers and with other vehicles. Connected cars bring a new level of convenience and excitement to drivers and passengers, but ‘being connected’ also allows the possibility of someone intruding your car. Connected cars can be vulnerable to malicious hacking, and security will be critical in the upcoming era of autonomous driving.

Find out how Infineon propels automotive data security to the next level.

autonomous-driving.jpg
autonomous-driving.jpg
autonomous-driving.jpg
cybersecurity-wearable-payments.jpg
cybersecurity-wearable-payments.jpg
cybersecurity-wearable-payments.jpg

The future of payment is contactless and mobile. We are on a journey towards seamless payment solutions that addresses consumers’ expectation of faster, easier and more convenient experiences. Already today almost anything can be turned into a contactless payment device. Consumers are able to carry payment accessories such as rings, bracelets or watches. This trend is paving the way for even more advanced IoT payment solutions. A connected fridge could detect that milk is missing, automatically order new one and pay for it. For all this security is a fundamental necessity.

Find out what Infineon offers for cashless payments.

Downloads

The Internet of Things (ioT) connects the real with the digital world and is one of the most important technology trends of our time – as the number of devices within the IoT grows with each passing day, so too does the number of potentially accessible nodes. Hence protecting data and devices is vital in the face of a growing threat landscape.

Detlef Houdeau
Detlef Houdeau
Detlef Houdeau

What is the status of regulation, standardization & certfication of IT, ICT and IoT products and systems in the European Economic Area? What is the scope of the EU Cybersecurity Act? Which are the currently used security standards for CE products? Detlef Houdeau, Infineon’s security expert for public policy, gives a comprehensive overview of all existing and upcoming regulations, termini and standards with which device manufacturers should be familiar.

Take a look at the video on Regulation, Standardisation and Certification of IT, ICT and IoT products and systems in the EEA here.

Thomas Poeppelmann
Thomas Poeppelmann
Thomas Poeppelmann

The quantum computer enjoys the aura of a super computer that will shoot us into the next age of IT and is able to crack even the most robust of codes in a flash. Quantum-safe cryptography is often called post-quantum cryptography (PQC).

PQC comprises publickey encryption or digital signature algorithms that rely on the hardness of sophisticated mathematically problems. It is assumed that these problems are even intractable for powerful quantum and classical computers. To facilitate the development of new quantum-safe and practical schemes the National Institute of Standards and Technology (NIST) has started a standardization process.

Learn how standardization processes help preparing today for the potential danger of tomorrow here.

Cristina Delera
Cristina Delera
Cristina Delera

Securing your IoT solution/strategy is a vital necessity. Security must become a number one priority and be integrated from the beginning.

Building trust between IoT devices is the first step in a holistic strategy. IoT devices need strong, tamper-resistant protection. This degree of protection cannot be provided by software alone – it needs hardware-based security.

We recommend a security solution which is optimized for IoT devices and use cases and helps to overcome typical business and operational challenges. More insights are available here.

Since 2014, the number of attacks on global organizations has increased by almost 50 percent. By looking at the consequences of these cyberattacks, we can quickly realize that without security, digital technologies would not have broader acceptance for a longer period of time.

With the right level of security we can avoid information loss, business disruption and other grave impacts.

infineon-cybersecurity-infographic.jpg
infineon-cybersecurity-infographic.jpg
infineon-cybersecurity-infographic.jpg

Downloads

embeddedsecurity.jpg
embeddedsecurity.jpg
embeddedsecurity.jpg

Cloud computing provides the tools and technologies to build data-intensive applications more affordable than traditional techniques. With millions of devices connected to the IoT, both manufacturers and consumers need to be sure that the identity of each and every device is genuine. Trusted device identities form the very basis for secured cloud connectivity and cloud computing. Therefore device identities need the best protection possible. Find out how Infineon improves cloud security.

In our fast moving world automation and interconnectivity are gathering pace. The entire value chain in the industry 4.0 is digitally connected, constantly supplying data and optimizing itself. Production is made faster, more efficient and more flexible. The urgency of Industrial Internet of Things (IIoT) security is becoming more and more apparent. It’s clear that security has come to the top of the agenda as a result of many high-profile cyberattacks.

Find out how Infineon enables the fourth industrial revolution.

embeddedsecurity.jpg
embeddedsecurity.jpg
embeddedsecurity.jpg
smart-home-cybersecurity-.jpg
smart-home-cybersecurity-.jpg
smart-home-cybersecurity-.jpg

Smart Home demands for intelligent devices that are equipped with sensors, controllers, actuators and security. This means they can collect, interpret and process data and then trigger appropriate actions or responses - all within a secured environment. Interoperability and communication between the devices and systems are prerequisites. Infineon is in the position to guide partners through this exciting new market while they can explore new opportunities and business models.

Cars are evolving fast. They are becoming digitized, connected and operate no longer as isolated vehicles. Already today, cars communicate with their environment, their passengers and with other vehicles. Connected cars bring a new level of convenience and excitement to drivers and passengers, but ‘being connected’ also allows the possibility of someone intruding your car. Connected cars can be vulnerable to malicious hacking, and security will be critical in the upcoming era of autonomous driving.

Find out how Infineon propels automotive data security to the next level.

autonomous-driving.jpg
autonomous-driving.jpg
autonomous-driving.jpg
cybersecurity-wearable-payments.jpg
cybersecurity-wearable-payments.jpg
cybersecurity-wearable-payments.jpg

The future of payment is contactless and mobile. We are on a journey towards seamless payment solutions that addresses consumers’ expectation of faster, easier and more convenient experiences. Already today almost anything can be turned into a contactless payment device. Consumers are able to carry payment accessories such as rings, bracelets or watches. This trend is paving the way for even more advanced IoT payment solutions. A connected fridge could detect that milk is missing, automatically order new one and pay for it. For all this security is a fundamental necessity.

Find out what Infineon offers for cashless payments.

Downloads