The security challenge posed by the Internet of Things: Part 2

In part one of this series, we outlined the three tiers of the IoT security architecture and three key security challenges IoT devices pose. Now we will move on to explore three specific examples of the security challenges IoT deployments can pose and underline the importance of thinking strategically to head off IoT security threats, says GH

Read more

Platforms – simplifying the infinitely complex

It’s all too easy for a rapidly emerging technology sector to get caught up in its own particular world. As companies rush to establish their place in what was once just a blank space on the map, aggressively promoting their own particular visions and product strategies, potential customers can become confused by a blizzard of

Read more