Cyberus Labs concludes the European Commission founded ELIoT Pro project.
Published May 29, 2020
Press release Katowice, May 29th, 2020 Cyberus Labs after completing its last technical deliverable due as part of the European Commission’s SME Instrument /Horizon 2020 programme has concluded two-years long journey. The result of it was development and preparation for commercialization of the breakthrough, end-to-end cybersecurity solution for IoT networks – ELIoT Pro. ELIoT Pro
MoreELIoT Pro reaching its final technology milestone, delivering IoT device provisioning component with use of the mobile app.
Published May 28, 2020
Press release Katowice, May 28th, 2020 Cyberus Labs has completed its last deliverable due as part of the European Commission’s SME Instrument /Horizon 2020 programme, which provides ELIoT Pro’s functionality of the IoT devices provisioning with the mobile app. In this last deliverable, we have enriched the ELIoT Pro platform with two new features. The
MoreELIoT Pro White Paper Series Part 4: Stay ahead of the hack
Published May 27, 2020
This whitepaper is the last of the 4 series of whitepapers that deal with cyber security. In this part, we answer the question ELIot Pro’s self-healing technology with predictive analytics works. We also write about how to keep system safe and secure. As you already known from the ELIoT Pro White Paper 3, Cyberus Labs
MoreEnigma Part 2 – Why Enigma code was broken by Polish mathematicians | #Ep 14
Published May 25, 2020
Why did Polish mathematicians figure out how Enigma worked? This is the question which Jack Wolosewicz starts off episode 14. He is pointing out two main reasons. First, there has been a long academic tradition and history in Poland; high standards for intellectual accomplishments and understanding science and mathematics. One of the most outstanding examples,
MoreEnigma Part 1: German Enigma’s encryption and its major weaknesses | #13
Published May 22, 2020
To begin with, Jack sheds light on the problem with the famous German coding machine Enigma used extensively during World War II by the German military. Its weakest part was human factor, as he explains. This, in turn, is essential in Human-to-Machine authentication nowadays. Therefore, human error of iterating the same message while sending encoded
MoreELIoT Pro White Paper Series Part 3: The Brain behind the IoT security
Published May 20, 2020
Today, we present the third part of our ELIoT Pro White Paper Series. In this one we examine the need to set rules to monitor the behaviour of an IoT device, track its performance and detect malfunctions. Problems with IoT IoT is rapidly becoming a transformative force, delivering the digital lifestyle to billions of people.
MoreCybersecurity is the gateway to future success of IoT | #12
Published May 18, 2020
Episode 12 focuses on the very immune system as the heart of any mechanism. Jack Wolosewicz explains that such a system is critical to the survival of any software. The future of the IoT seems to be extremely promising. Therefore it’s of the paramount importance to develop state-of-the-art immune systems. Without such solutions the IoT
MoreELIoT Pro – An immune system for the world of IoT | #11
Published May 15, 2020
This episode starts with a striking comparison of where we are with the Internet and IoT. As they are young organisms, there is a compelling analogy to a human organism – they are vulnerable to various diseases in the early stages of development. That’s why they have to initially develop an immune system. What are
MoreELIoT Pro expert White Paper Series Part 2: Titanium 2.0
Published May 13, 2020
In the second whitepaper of our 4-part series we explore Machine-to-Machine (M2M) authentication, including the problems associated with designing cyber security solution for IoT devices. Explore our solution based on our proprietary Lightweight Encryption methodology. Internet of things, source of danger? The term “Internet of Things” (IoT) was coined in the late 1990s by an entrepreneur
MoreELIoT Pro: Does the complexity equals security? No!|#10
Published May 11, 2020
Why cyber security has to be easy to use? Complex and long passwords do not appeal to people since they are difficult to remember. Such systems burdened with challenging security mechanisms are less likely to be used by users. Bad password habits Users are accumulating more and more passwords, and many of the recent breaches
More