Home Tags Security
As AI offers the opportunity to manage the vast volumes of data generated from IIoT, its underlying architecture must enforce security and enhance visibility, for IIoT designers to future-proof deployments.
Bastille announces commercial version of its popular DoD only Fly-Away Kit to allow corporations to rapidly locate cell phones, Wi-Fi, Bluetooth and BLE devices at multiple and/or temporary locations such as meetings, events, and remote offices
NanoLock Security and Adesto® Collaborate to Deliver Powerful Flash-to-Cloud Security for IoT Devices
Companies join to bring a powerful device level protection that helps secure the most vulnerable IoT and edge devices, in markets such as industrial and utilities, from outsiders, insiders, and supply chain attacks.
Smart homes never really caught on in the way many people predicted. Here we look at some of the reasons why that might be.
Very few consequential new technologies are without risk, including smart factories, which combine multiple maturing technologies for data mobility and business intelligence. As major hubs for the Internet of Things (IoT), smart factories require designers and decision-makers to keep security a top priority.
The article dives deep into various scenarios of data encryption protocols within corporate IoT networks to accommodate ever-changing demands for cybersecurity for businesses in different industries.
Remy Cricco, Chairman of the SIMalliance, explores why a standardised API enabling IoT devices to easily leverage the SIM to execute security services and store credentials will deliver scalability, simplicity and trust.
IoT smarthome devices give hackers an easy way into your home network.
Next installment in the smart city privacy series. Why is privacy so important and how does surveillance capitalism fit with the development of the smart city?
Read this post and find about security vulnerabilities found in Amazon Echo and Yandex Station as weall as about dodgy apps on Alexa and Google Home.