We’re moving into a new world where everything and everyone swings between real and virtual world, says Arun Rishi Kapoor, business consultant of Tech Mahindra.
With pressure to ensure consumer data is protected mounting, Gemalto, the provider in digital security, released the results of a global study which reveals that two in three companies (65%) are unable to analyse all the data they collect and
You can’t have an automated car without reliable communication infrastructure and stable mobile communication connectivity. The next generation mobile communication standard is indispensable. Infineon Technologies AG contributes to introducing the 5G standard into the car and has joined the 5G Automotive Association e. V. (5GAA).
Over the weekend, a code was reportedly employed on a large number of Internet of Things (IoT) connected devices to form a botnet. The botnet was then deployed to attack websites with a distributed denial of service (DDoS) attack.
From construction to the public sector, insurance to retail, virtually every organisation is looking hard at the Internet of Things (IoT) to assess opportunities to improve efficiency, reduce costs and enhance customer experience.
An overwhelming majority of business executives (81%) believe that successful adoption of the Industrial Internet of Things (IIoT) is critical to their company’s future success, but only 25% have a clear IIoT strategy.
Five of the eight largest healthcare security breaches that occurred since the beginning of 2010 – those with more than one million records reportedly compromised – took place during the first six months of 2015, according to IBM X-Force’s 2016 Cyber Security Intelligence Index.
As a result of Kamstrup’s strategy to increase flexibility and interoperability within smart metering in Austria, Kamstrup and Itron have developed an alliance centered upon energy metering.
Any discussion of security is dependent on context. This report will discuss security issues associated with migrating M2M/IoT communications to cellular technologies or creating a new M2M/IoT product using cellular communications. Historically most M2M communications were focused around proprietary protocols, private networks, leased lines and POTS.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.