Search Results

Search results for: IoT security

Broadband Forum brings IoT home with new USP standard

The Broadband Forum published its User Services Platform (USP) – a new standard for implementing, deploying and managing all types of devices in the broadband home. For the first time, USP brings a unified, common approach to securely deploy, manage, and control network-aware consumer electronics, (more…)

Read more

April 18, 2018

Posted by: Zenobia Hegde

Jabra launches Engage – the business headset engineered for ultimate call satisfaction and security

Jabra is launching a new franchise of wireless headsets that sets new standards for call quality, security and the number of staff who can simultaneously use them. Jabra Engage sets out to be the world’s most powerful professional wireless headsets. (more…)

Read more

April 13, 2018

Posted by: Zenobia Hegde

TÜV Rheinland and SecurityMatters to harness next generation industrial control system cybersecurity solutions

TÜV Rheinland and SecurityMatters, a provider in operational technology (OT) network assessment and protection, announced strategic partnership aimed at helping worldwide Industrial Services clients like manufacturing plant operators, energy and utility companies, transportation and transit system operators to rapidly detect and remediate the increasing cybersecurity threats targeting their operational technology infrastructure. (more…)

Read more

Posted by: Zenobia Hegde

Cool IoT Use Cases: Airfreight transportation employs Blockchain technology

Market overview

Blockchain has the potential to significantly improve the efficiency and transparency of business networks, especially in cargo & logistic flows. (more…)

Read more

April 12, 2018

Posted by: Zenobia Hegde

Newly released mesh network performance results from Silicon Labs clarify IoT connectivity options

Silicon Labs has released the industry’s first comprehensive network performance results based on large-scale, multicast testing of Zigbee®, Thread and Bluetooth® mesh software. Each mesh networking protocol presents unique characteristics and advantages, depending on the use case and end application. (more…)

Read more

April 10, 2018

Posted by: Zenobia Hegde

8th generation Intel Core platforms from Advantech aim to enable IoT innovations

Advantech, a provider of embedded computing solutions, has announced its new range of embedded computing platforms with the latest 8th Generation Intel® Core™ processor family (formerly Coffee Lake). (more…)

Read more

Posted by: Zenobia Hegde

First globally compatible smart lock enables service providers to offer a single smart access and home security solution

Danalock, a provider of smart lock solutions for smart homes and businesses, announced that its Danalock V3 is the first globally compatible, retrofit smart lock to be fully integrated into the Alarm.com interactive security platform, extending its ecosystem of connected devices for global customers. (more…)

Read more

Posted by: Zenobia Hegde

Skills gap in the IoT market

Introduction

The Internet of Things (IoT) is a term broadly associated with the connection of sensors or other devices to the Internet and to other associated gadgets. The IoT is a massive system of things which gather and offer information about the way they are utilised and incorporate a remarkable number of objects of every kind – (more…)

Read more

Posted by: Zenobia Hegde

The next big thing is IoT connectivity is smaller: Digi Xbee3

As intelligence continues to move out to the edge of IoT networks, the need grows for hardware devices that provide more capabilities, adaptability, security, and extensibility. The next generation of IoT solutions must be able to aggregate and analyse data where it’s captured on a distributed network, (more…)

Read more

April 9, 2018

Posted by: Zenobia Hegde

New Trustwave report depicts evolving cybersecurity threat landscape

Trustwave released the 2018 Trustwave Global Security Report which reveals the top security threats, breaches by industry, and cybercrime trends from 2017. The report is derived from the analysis of billions of logged security and compromise events worldwide, hundreds of hands-on data-beach investigations and internal research. (more…)

Read more

April 6, 2018

Posted by: Zenobia Hegde