security Archives | IoT For All
Home Tags Security

Tag: security

The text "4IR" on a colorful background

4IR: Its Meaning in the Context of South Africa

South Africa, with the rest of the world, finds itself in the midst of the 4th Industrial Revolution. The article discusses the meaning of the 4th Industrial Revolution in the context of the South African ecosystem.
A person holding up a cloud and the text "GDPR"

Cloud-Native Environments: A Challenge for Traditional Cybersecurity Practices

"The Cloud" doesn't exist: It is just a marketing buzzword which hides tens of thousands of racks in data centers filled with servers. In this real-world, security responsibilities remain very concrete but need to be approached and organized differently.
A castle with wifi signals surrounding it and surveillance cameras

Smart Building Security: Creating Your Digital Fortress

Smart buildings bring numerous conveniences to property managers, but IoT, which allows buildings and devices to communicate, also exposes security issues.
A lock and many keys

Common Challenges of Implementing a Single IoT Security Standard

Developing a cybersecurity standard that will provide us with more secure IoT is paramount, but several challenges must be taken into account.
A lock on a background of computer code

Finding a Balance Between IoT Security Needs and Business Needs

The Internet of Things (IoT) or the network of physical devices, vehicles, home appliances, and other items embedded with software, sensors, and network connectivity which enable these objects to connect to each other and exchange data, presents a huge opportunity for businesses as well as huge risks.
Press Release

NanoLock Security Granted US Patent for its Cloud-to-Flash Electronic Security Solution

First patent granted from intellectual property (IP) portfolio, which includes several additional patent applications for the company’s cyber defense solution for connected edge devices
[7.3.19] Merchants Fight IoT-Enabled Fraud

Merchants Fight IoT-Enabled Fraud

While IoT tools offer revolutionary applications in many industries, they also leave the door open for costly fraud. Merchants be precautious.
Image of a starburst with "M Q T T" in the center

The 3 Basic Concepts of MQTT Security

When designing the network security for an IoT device, keep in mind these three basic concepts: identity, authentication and authorization.
5 Benefits of Commercial IoT and Automation

5 Benefits of Commercial IoT and Automation

What about the benefits of commercial IoT? It can significantly improve your business by transforming your customer experiences.
IMage of fingerprints over Python code that says "HACKED BY"

Code Stylometry: How AI Could End Anonymous Hacking

Hackers are an ever-present threat today. New code stylometry machine learning algorithms are able to de-anonymize hackers based on style.

Trending

Explore