Our Resources
Vivamus suscipit tortor eget felis porttitor volutpat. Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a.
Hackers Attacking IoT Vulnerabilities
In November, 2016, Armis Security announced that approximately 20 million Amazon Echo and Google Home devices were vulnerable to attacks by a...
7 Key Elements of Proactive IoT Security
All types of Internet of Things (IoT) devices are under attack. They are routinely recruited as unwitting members of botnets used for Distributed...
Allegro Discusses IoT Identity with One World Identity Podcast
Allegro Software and One World Identity Discuss The Need For Strong IoT Identity One World Identity sat down with Allegro Software to discuss...
Allegro Software Expands FIPS Support For IoT Applications
Allegro Software Expands FIPS Support For IoT Applications Needing Validated Cryptography in Military, Medical and Federal Environments FIPS...
Allegro Software Expands ACE support with Secure Data-At-Rest Solution for IoT
Allegro Software Expands the Allegro Cryptography Engine™ (ACE™) With Support For An Advanced Data-At-Rest Solution Specifically Engineered for the...
Protecting the IoT: Thousands of cyberattacks caused by a single vulnerability
Protecting the IoT: Thousands of cyber attacks caused by a single vulnerability The Internet of Things (IoT) is an ever-growing set of applications...
Open Source Issues in Mergers and Acquisitions
Open Source Issues in Mergers & Acquisitions In a merger or acquisition in which a technology company is the target, the target company’s...
“Misfortune Cookie” – Allegro Software Urges Manufacturers To Maintain Device Security
Allegro Software Urges Manufacturers To Maintain Firmware for Highest Level of Embedded Device Security CVE-2014-9222 and CVE-2014-9223 security...
Allegro Software Announces Support for DLNA’s VidiPath™ Interoperability Guidelines
Allegro Software Announces Support for DLNA’s VidiPath™ Interoperability Guidelines Interoperability toolkits to enable consumer choice for...
Let’s Talk IoT Security
Implementing IoT device security can be a challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design. Click the button below to schedule a one-on-one web conference to discuss your security needs.