Home Tags Security
South Africa, with the rest of the world, finds itself in the midst of the 4th Industrial Revolution. The article discusses the meaning of the 4th Industrial Revolution in the context of the South African ecosystem.
"The Cloud" doesn't exist: It is just a marketing buzzword which hides tens of thousands of racks in data centers filled with servers. In this real-world, security responsibilities remain very concrete but need to be approached and organized differently.
Smart buildings bring numerous conveniences to property managers, but IoT, which allows buildings and devices to communicate, also exposes security issues.
Developing a cybersecurity standard that will provide us with more secure IoT is paramount, but several challenges must be taken into account.
The Internet of Things (IoT) or the network of physical devices, vehicles, home appliances, and other items embedded with software, sensors, and network connectivity which enable these objects to connect to each other and exchange data, presents a huge opportunity for businesses as well as huge risks.
First patent granted from intellectual property (IP) portfolio, which includes several additional patent applications for the company’s cyber defense solution for connected edge devices
While IoT tools offer revolutionary applications in many industries, they also leave the door open for costly fraud. Merchants be precautious.
When designing the network security for an IoT device, keep in mind these three basic concepts: identity, authentication and authorization.
What about the benefits of commercial IoT? It can significantly improve your business by transforming your customer experiences.
Hackers are an ever-present threat today. New code stylometry machine learning algorithms are able to de-anonymize hackers based on style.