Home Technology

Technology

Image of a person holding a padlock over binary code

Why You Need Digital Policies for Your IoT Devices

It’s important to build IoT on a foundation of strong digital policies. Without digital policies, your organization is at greater risk than you realize.
Dont-Force-Voice-Enabled-Devices-to-Communicate-With-Non-Voice-Enabled-Devices

Don’t Force Voice-Enabled Devices to Communicate With Non-Voice-Enabled Devices

Smart homes are great, but the WiFi that connects most smart speakers doesn't handle voice well. ULE Alliance's DECT-based standard can help.
A person monitoring a woman at a coffee shop.

Cybercriminals Take Aim: The Dark Side of IoT

As IoT extends network connectivity to a plethora of new objects, the number of attack surfaces increases manifold. IoT cybercrime is on the rise.
Image of a monitoring dashboard on an iPhone

How New Technology Is Changing Business Models

Smart home business models are evolving rapidly through the development of new IoT products and services. New data processing paradigms are emerging.
Mitigating-IoT-Medical-Device-Risks-Part-III-Protect-Detect-and-Improve

Mitigating IoT Medical Device Risks (Part III): Protect, Detect and Improve

Risk mitigation strategies for the medical device network environment should come after establishing good visibility into the devices—their connectivity and behavior—and...
Couch and a charger

Networking 215+ Smart Home Devices

This post details problems homeowners face when trying to make their home a smart one. There’s a lot to learn and much to overcome.
Image of two speech bubbles: one that says "xin chào," or "hello" in vietnamese and "wo ist die...," which is "where is the..." in German

IoT Applications in Task-Based and Foreign Language Learning

Welcome to the second article of our IoT Applications in Education series. In our introductory article, I gave a brief overview of...
Mitigating-IoT-Medical-Device-Risks-Part-II-Using-Device-Data-to-Calculate-Cyber-Risk

Mitigating IoT Medical Device Risks (Part II): Using Device Data to Calculate Cyber-Risk

This blog series introduces a step-by-step approach to help security teams in the medical space create a comprehensive framework for addressing...
Image of a medical device with gates around it

Mitigating IoT Medical Device Risks (Part I): Making On-Network Devices Visible

Healthcare security leaders face many challenges, but one of the trickiest is cyber-protecting medical devices. Unprotected medical devices lead to more...
Wooden hand with the text "Next Generation Internet"

NGI Horizon 2020: Calling All IoT Innovators

The NGI, or Next Generation Internet (NGI) initiative, was started by the European Commission back in 2016. It's funded by the European Union's Horizon...

Popular

Resources