Post By Simon Montford on Oct 19, 2018 Cybereason, creators of the leading cybersecurity AI Hunting Platform, today unveiled its strategic plan to partner with Arm in securing billions of Internet of Things (IoT) devices across sectors, including in the utility and energy, transportation and logistics, and connected buildings industries. With SoftBank’s backing, the companies are delivering compelling solutions and leading the charge in providing device-to-data security for IoT. The companies plan to protect one trillion connected devices by 2035.
Post By Simon Montford on Oct 18, 2018 The world’s most advanced security product for IoT devices was unveiled yesterday at the IoT Solutions World Congress. Developed by the UK company, Crypto Quantique, it has the capabilities required to become the foundational security product for every IoT device in the world. The foundational technology consists of the world’s first quantum driven secure chip (QDSC) on silicon which, when combined with cryptographic APIs, provides highly scalable, integratable, easy-to-implement and seamless end-to-end security for any connected device.
Guest Post By Jacelyn Brown on March 14, 2017 It sounded like something from the National Enquirer: another attention-grabbing headline to put alongside sightings of Elvis on the moon, and alien reptiles in Buckingham Palace. Yet the recent Wikileaks report, stating that the CIA can use smart televisions to monitor us, created quite a media storm. In fact the revelation was covered extensively by media outlets across the world.
Posted By Simon Montford on November 24, 2016 The run up to the festive season is always a busy time for event organisers and delegates alike. Peak conference season means there are so many to choose from, but in order to get the best ROI it's vital to remain laser focused. This is primarily because there are not only financial costs that need to be accounted for, such as travel and accommodation, but also intangible ones. Everything from the amount of emotional energy expended (if you don't feel exhausted after a conference, you're not doing it right), to opportunity costs - time is (or should be) your most valuable asset. Here's a look back at some of the events I attended last month, that were definitely worth expending time and energy for!
Guest post By Ben Butchart on May 25, 2016 A briefly trending item on Hacker News this week caught my attention: “Announcing Akasha - a next generation social network.” Yep. Know what you’re thinking. Yawn, but what actually came next blew me away, “Powered by the Ethereum World Computer, embedded into the InterPlanetary File System.” That was enough for me. I’m in. Where do I sign?
Posted By Paul Bradley on May 23, 2016 It’s just the beginning for 5G. Yet if you look at the already extensive amount of media comment on the subject, it’s obvious that the industry has a clear idea of the services that it hopes 5G will support, in Massive IoT and in other sectors. What’s less certain is just how the technology will develop - indeed standardisation activities are just commencing.
|
Categories
All
AuthorsSOCIAL MEDIA© Simon Montford (WEB3IOT), 2014-2019. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Simon Montford and WEB3IOT with appropriate and specific direction to the original content at web3iot.com.
Archives
February 2020
|