Cyber Security at Airports: Trustworthy Systems from Germany are in high demand
  The threat posed by cyberattacks on critical infrastructures is increasing, and with it the importance of resilient systems 'made in Germany'.   The demand for trustworthy technology is continuously increasing - especially si...
Enhance security systems with Artificial Intelligence innovation
As more people gain access to the internet worldwide, the importance of effective cybersecurity increases. There are those who intentionally aim to exploit and gain unauthorized access to an organization’s systems and confidential informa...
Agile Engineering in Safety and Medical Technology: A Contradiction?
  Requirements are strict in safety and medical engineering. Is it possible to apply both the V Model and the SCRUM method to this field?   Andreas Schlaffer, Head of R&D at Kontron Austria, explains the pros and cons of b...
Securing your company’s embedded computing future - PART 3
  Kontron launches SEC-Line Platform for secure embedded computing environments Embedded computing is morphing into edge computing, where systems deployed in the real world are always connected. In turn, this is demanding closer pr...
The Future of Secure Embedded Computing - Part 2  
Keeping connected infrastructures healthy and secure in the physical world If ever a superhero was needed, it’s now: One with ‘X-ray vision’ and extra sensory perception that intuitively identifies imminent danger and is always the...
System Security: Some Truths about Secure Communication Lines & Updates
      While all that stuff like TPM and secure/trusted boot is good to hide and secure what's inside the box, it helps to protect a system from mostly physical attacks. However, the attack scenario in the industrial...
When two worlds collide: Why Edge Computing is disrupting the current IT/OT status quo when it comes to security
  As Edge Computing continues to expand, differing priorities are inevitably going to cause growing friction between IT and OT – unless carefully managed. But, at the end of the day, when it comes to what is connected to company n...
Certificates, Keys and Hashing - Some Insider-Basics
With this blog, we reached the middle of my security series - some problems were pointed out and solutions were given. Let´s now look a little bit deeper into the topic and let me explain in my words (I promise to keep it crispy) some ba...
SUSieTec: Security Components Overview
  Looking back at the last three articles, they more focus on describing the problem and the border condition of security rather than appropriate solutions. Finally, this article will provide some interesting approaches that secure ...
Assessment of the End Product
  In this blog, I want to do a security assessment of an end device. To get started, we will avoid making a mistake that happens a lot in our business! So please forget all security solutions that you have heard of and let us look a...
IT-Security and the Impact of IoT
    Welcome back to the second episode of my security blog series! So when we combine the ‘old unconnected industry’ with IT-connectivity stuff (I will not explicitly call it ‘IoT’ because it is much, much more) we hav...
Security – how much do I need?
  So back at S&T/Kontron, we decided to revive the security topic on our blog. It is quite broad so let's  slice and dice it down to smaller parts. Let's  start with the obvious: everybody needs security and wants secu...
Hacker Eldorado IoT: Security Risks in the Internet of Things
2016 was an extremely thrilling year for IT security experts. A controversial hacking discussion surrounded the US election and even outside of politics, high-profile attacks on IT systems were manifold. What many hacks had in common was th...
Standard IoT Security Solution Offers Protection Against Hackers
Industry 4.0 and the Smart Factory promise a boost for innovation in the production sector. However, corresponding IoT security measures are still only beginning to develop, according to a study by the German Federal Ministry for Economic A...
Kontron Security Solutions: Embedded Systems Safe and Sound  
When I started working in the embedded computer market in 2004, except for a few select customers in the defense sector of the industry, it was absolutely oblivious to security vulnerabilities. The ever increasing importance of connected sy...
IoT Security: Is the State Device ID a Good Idea?
The Internet of Things is a whole new infrastructure which of course leads to a number of challenges that must be addressed. In Germany there are plans for an “Identity Safety Act” that should protect this new infrastructure. Right now,...
Wi-Fi in Aircraft: Are we Safe from Hacker Attacks or Hijacking?
An increasing number of airlines offers „On-Board Wi-Fi“ to their passengers with connectivity improvements to the aircraft while it is on the ground (3G/4G LTE) and in-flight (air-to-ground and air-to-satellite). This develop...
Internet of Things and Security: Mission impossible?
The internet of things (IoT) will be the next step in integrating even more of the real world into the web. With this step companies and consumers will be facing billions of insecure devices because of the inadequate security meas...
Secure Gaming Machines: Wanna bet on it?
Ever since the gaming industry introduced electronic video slot machines and subsequently other electronic gaming formats, the game designers have been in pursuit of that next best irresistible game that will attract and intoxicate players ...
How do you feel today?
Being a computer person, I usually do not see technology like a form of black magic. Whenever I consider even the most complex system, I can imagine all the small pieces and the collection of techniques humming within this marvel.  Aft...
Air-condition with built-in backdoor
It’s really surprising what you hear in M2M (Machine-to-Machine) groups. Last time I read an unbelievable data point: 55,000 air-condition or heating systems are connected to the Internet without adequate (or any) protection  Due to...
Contact Sales 1-888-294-4558 / 858-623-3094 Contact Sales Support 888-835-6676 / +1 450-437-5682 Contact Support
More Contact Options