Industrial IoT: Security Challenges and Expectations

Industrial IoT: Security Challenges and Expectations

Companies in manufacturing and transportation-related industries have significantly benefited from the integration of industrial IoT technologies (IIoT). Past insurmountable technical challenges have been eliminated with ease since IIoT platforms have come into widespread use especially in…

Cybersecurity Threats – The New Reality for Utilities

Cybersecurity Threats – The New Reality for Utilities

Cybersecurity experts agree: Cyberattacks are the new reality for utility companies. On Jan. 10th, 2018, a major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity,…

Digital Health’s cybersecurity imperative

Digital Health’s cybersecurity imperative

If you haven’t already heard, the age of digital health is upon us. And for healthcare providers, patients and consumers, it’s about time.What is digital health?Digital health, sometimes referred to as eHealth or Mobile Health, refers…

RSA Conference in Review – “Securing What Matters”

RSA Conference in Review – “Securing What Matters”

Coming off of San Francisco’s RSA Conference, the best way to describe the event is “sensory overload.” An estimated 45,000 technology and cybersecurity professionals descended upon Moscone Center – but the crowds overflowed into local bars,…

The Importance of Security by Design for IoT Devices

The Importance of Security by Design for IoT Devices

We’re on the verge of an explosion of IoT-related products and services and the security for IoT devices is a concern. We all know that the Internet of Things or IoT has started to disrupt consumers,…