Evaluating your IT risk – how and why

Ensuring complete protection against cyber criminals can be a virtually impossible task, but organisations can give themselves the best chance of avoiding an attack by performing regular IT risk assessments. The current threat landscape is a turbulent one and assessing risk management processes to ensure they address an organisations specific challenges should be a priority.

Read more

Live secure provisioning and secure data exchange shown between LoRaWAN sensor and cloud-hosted backend

Avnet Silica, an Avnet company, Actility, the industry provider of low power wide area networking, and Trusted Objects, a provider of secure firmware and security services, announced the availability of a demonstrator showcasing hardware-secured Over-the-Air (OTA) activation

Read more

Connecting medical devices

The benefits of hospital device connectivity According to the Royal College of Nursing, nurses in the UK spend an estimated 2.5 million hours a week filling out “non-essential” paperwork. By implementing IoT-enabled medical devices, data on a patient’s vital signs and intake of medication can be collected and monitored in real-time. Not only is the

Read more