ARCHITECT’S GUIDE: IOT SECURITY

The explosion of intelligent connected devices, or the Internet of Things (IoT), presents a massive expansion of the “attack surface” hackers can target. Some researchers predict the IoT will reach 50 billion connected devices by 2020. Many of these devices are vulnerable to attacks and the level of risk continues to rise. Failure to secure IoT systems has already led to several costly or dangerous incidents1.

Spotlight

Tessera

Tessera® was founded in New York in 1990 by ex-IBM scientists with a vision to create multichip systems differently...

OTHER WHITEPAPERS
news image

Cloud-native 5G –Getting Started

whitePaper | February 28, 2023

As they deploy 5G, telecoms operators around the world are experimenting with cloud¬native core networks, which offer greater flexibility, scalability and automation than conventional telecoms networks. This paper explores how telecoms operators could go about implementing a cloud¬native 5G core network. Most early movers are taking one of two approaches to deploy a cloud¬native 5G core:

Read More
news image

Breaking the Silos in V&V: The IoT Way

whitePaper | May 1, 2022

For Years, testing methodologies have focused on individual elements (Silos) of an organized, connected system. Testing is getting performed in isolation for front-end, back-end and field devices. The result – even though an individual element may work well, the chain of connected system may still appear to be broken due to flaws in integration points.

Read More
news image

NICT Beyond 5G/6G White Paper English version 2.0

whitePaper | June 17, 2022

The implementation of fifth generation mobile communication systems in society has been in full swing since around 2020. Mobile communication systems have evolved into a communication infrastructure (1G-3G) and a living infrastructure (4G), becoming an indispensable element in the lives of individuals. It has become a social infrastructure that connects not only people but also things like the Internet of Things (IoT).

Read More
news image

WI-FI 6E AND FUTURE-PROOFING WIRELESS INFRASTRUCTURE

whitePaper | May 23, 2023

The future of wireless networking needs will continue to grow. Location based services, sensors, and IoT devices will continue to be added to wireless networks. Expanding and new uses of Wi-Fi that require high performing connections like AR/VR, AI/ML, and new technologies we don’t even know about yet will compete for wireless network resources. Finally, all the standard uses we currently associate with Wi-Fi like video and voice calls, streaming services and cloud hosted applications will continue to bring more devices to wireless networks with increasing traffic demands.

Read More
news image

Threat detection and response in cloud environments

whitePaper | August 1, 2022

Cloud environments change fundamental assumptions in how to perform threat detection and response. The highly dynamic inventory of cloud workloads means systems come and go in seconds. When system configuration errors are introduced during a build, they can be exacerbated and amplified when automation replicates the errors across many workloads. Shared responsibility with the cloud service provider (CSP) creates potential threat detection gaps in the attack lifecycle.

Read More
news image

Why VDI makes sense for hard-core UNIX® and Linux® engineering applications

whitePaper | July 19, 2022

By now, everyone has heard the terms desktop virtualization and VDI It seems like we’ve been pounded with marketing propaganda about these technologies from companies like VMware, Citrix® and Microsoft® since 2006. But if desktop virtualization is so good, why are most of the world’s desktops still “old-style” physical desktops and laptops?

Read More

Spotlight

Tessera

Tessera® was founded in New York in 1990 by ex-IBM scientists with a vision to create multichip systems differently...

Events