Search Results

Search results for: software

Five ways remote access will impact working practices – Part 2

Part 1 of this article appeared yesterday. Trends like the Internet of Things, 24/7 business cultures, and evolving technologies mean that the way that we work is changing rapidly, and businesses are increasingly sharing resources and collaborating in order to get ahead. (more…)

Read more

July 25, 2017

Posted by: Avadhoot Patil

Five ways remote access will impact working practices – Part 1

Trends like the Internet of Things, 24/7 business cultures, and evolving technologies mean that the way that we work is changing rapidly, and businesses are increasingly sharing resources and collaborating in order to get ahead. Some are unaware of the role remote access plays within these developments, when it often acts as the backbone. (more…)

Read more

July 24, 2017

Posted by: Avadhoot Patil

What is the current state of mobile security? Part 1

If you’re like most people, your phone is by your side throughout your day. Thanks to payment apps, mobile GPS and mobile banking, our phones now double as a wallet, map, bank and so much more. (more…)

Read more

July 20, 2017

Posted by: Avadhoot Patil

If an attack is successfully monetised, expect similar attacks to follow: Some preventive security steps

Adversaries are constantly evolving. Success breeds copy-cats. And security is multifaceted. These are some of the key lessons Jeremy Cowan takes away from talking to Ted Harrington, executive partner, Independent Security Evaluators. (more…)

Read more

July 19, 2017

Posted by: Avadhoot Patil

Balancing risk with IoT benefits: How industrial plants can be secured against hacking

The British media widely reported how the recent WannaCry cyber attack largely targeted NHS trusts across the country. However, what was not as widely reported was that the attack also affected many factories across the world, shutting down production and causing concerns about data security. (more…)

Read more

July 18, 2017

Posted by: Avadhoot Patil

Four ways to reinforce your SME against cyber threats

Despite its name, the small and medium-sized enterprise (SME) sector is colossal in terms of size and revenue, says Sneha Paul, product consultant at ManageEngine. (more…)

Read more

July 17, 2017

Posted by: Avadhoot Patil

AWS Greengrass, Ubuntu, and the upcoming boom in Edge computing

The growth of the edge computing market has been well-documented. BI Intelligence predicted that 5.6 billion Enterprise and Government IoT devices will be connected to edge devices by 2020 – up from approximately 15 billion today. (more…)

Read more

July 12, 2017

Posted by: Avadhoot Patil

A random look at IoT security

The traditional concept of a corporate security perimeter has been fading slowly for at least a decade. The cloud put it on life support and the IoT will kill it off for good. The IoT presents a whole new set of challenges and on a completely different scale. (more…)

Read more

July 11, 2017

Posted by: Avadhoot Patil

u-blox claims world’s smallest LTE Cat M1/NB1 multimode module with global support for IoT and M2M applications

u‑blox, a global provider of wireless and positioning modules and chips, announced the SARA‑R410M‑02B, a configurable LTE Cat M1/NB1 multi‑mode module with worldwide coverage. (more…)

Read more

July 10, 2017

Posted by: Avadhoot Patil

Transatel pleads for new pillars of IoT security

On May 22nd 2017, the European Union Agency for Network and Information Security (ENISA) issued a position paper raising this very issue of IoT security. Together with major actors of the semiconductor industry (Infineon, NXP, STMicroelectonics), the agency warned of a “market failure” in IoT security so far: it’s important to act now. (more…)

Read more

Posted by: Avadhoot Patil