Security

Smart home solutions take off but who will dominate as the market matures?

Smart homes and home automation are ambiguous terms used in reference to a wide range of solutions for controlling, monitoring…

2 years ago

Surrey Heath improves public engagement with XMAP mapping portal

Basingstoke, 23 June 2022 – Surrey Heath Borough Council has launched a new interactive mapping portal for public consultation on…

2 years ago

EmSPARK security used by Atonarp to provide device security for digital molecular solutions

Seattle, United States. 14 June, 2022 - Sequitur Labs announced that its EmSPARK security suite has been implemented into the…

2 years ago

Claroty extends visibility of industrial cybersecurity platform to the Internet of Things

Claroty, the global provider of industrial cybersecurity, introduced several enhancements to Continuous Threat Detection (CTD), its award-winning operational technology (OT)…

5 years ago

Businesses’ IoT data security concerns tackled by Tata Communications and Thales joint solution

Thales, a global provider of digital security, and Tata Communications, a global digital infrastructure provider, are working together to develop…

5 years ago

Five benefits of cyber security risk assessment

What is cyber security? Protection for your internet-connected systems in regards to the data from any cybercrime or fraud is…

5 years ago

Businesses predict huge potential for 5G adoption but are not ready to implement, says a new Cradlepoint study

A new study from Cradlepoint, a global specialist in cloud-delivered LTE and 5G-ready wireless network edge solutions, reveals that businesses…

5 years ago

How the ecosystem views IIoT roll-outs and security

In his regular new column on developments in the Internet of Things (IoT) ecosystem, Antony Savvas explores some evolving industry…

5 years ago

PTC enhances connectivity to industrial automation assets as KEPServerEX adds secure torque tool link

PTC has released the newest version of its Kepware industrial connectivity software. Kepware is foundational to the industrial connectivity capabilities of PTC’s…

5 years ago

As Samsung and Swann IoT apps breached, when will we confront our security flaws?

On Thursday, security flaws were revealed within the firmware of Samsung's SmartThings Hub. Cisco Talos issued a blog on multiple…

6 years ago

One size doesn’t fit all – for business case flexibility you need security and connectivity choices

As the Internet of Things (IoT) continues to mature, organisations are looking to select enabling technologies, services and solutions to…

7 years ago

Openness and security can go hand-in-hand to support IIoT

As organisations grapple with the complexities of securing industrial internet of things (IIoT) applications across multiple bearers, Robert Jones, vice…

7 years ago

IoT relies on five key attributes to ensure a secure foundation for services to run over

Security in IoT is a process that relies on continuous security across five key dimensions of an IoT service. These…

7 years ago