One identity Survey shows hackers getting months to exploit old IT users’ accounts

One Identity, a in helping organisations get identity and access management (IAM) right, released study results showing significant gaps in how organisations manage accounts used to access IT infrastructure, systems, and data—gaps that could result in major security and compliance deficiencies.

Read more

The ‘First Receiver’ concept. Part 2: The enabling architecture

The first receiver concept is predicated on the ability to leverage — to the hilt — the value of IoT data and it’s being enabled by an event-driven, publish and subscribe deployment architecture that takes what’s technologically possible and makes it practical.

Read more

Ongoing trends in IoT device lifecycle management

Today, the number of connected devices is set to overtake the world’s human population. This connected devices ecosystem is what we popularly call the Internet of Things or IoT.

Read more

A ‘common security model’ against typical hazards in the IoT

Up to now, individuals have generally been using a dedicated computer for work; now, however, the Internet of Things (IoT), with billions of networked devices that are for the most part not monitored by humans, presents enormous inherent security risks.

Read more