Privacy and the Internet of Things

June 8, 2018

The proliferation of network-connected devices, also known as the “Internet of Things” (IoT), offers unprecedented opportunities for consumers and businesses. Yet devices such as fitness trackers, personal home assistants (e.g., Amazon Echo, Google Home), and digital appliances are changing the nature of privacy as they operate silently in the background while transmitting data about a broad range of human activities and behaviors.

Spotlight

Applied Materials

Applied Materials is the global leader in materials engineering solutions for the semiconductor, flat panel display and solar PV industries. Our technologies help make innovations like smartphones, flat screen TVs and solar panels more affordable and accessible to consumers and businesses around the world.

OTHER WHITEPAPERS
news image

Rubrik Security Cloud Architecture and Security Implementation

whitePaper | February 22, 2023

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. It helps organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More
news image

4 Keys to Managing IT Remotely

whitePaper | January 12, 2022

The advantages of a well-designed remote IT management solution become indispensable once it enables MSPs and IT departments to do all of the following remotely: Run and maintain IT infrastructure to significantly reduce the average ticket response time Perform maintenance tasks during off hours to avoid interrupting employees Be proactive instead of reactive by keeping software current and safe from cyberattacks, with endpoints protected and data backed up Gain real-time insights into IT infrastructure and share them with business stakeholders to help evaluate current conditions, make timely decisions, and project future needs Boost operational efficiency and reduce costs by monitoring devices and addressing potential problems before they become major issues

Read More
news image

Whitepaper: Connected Machines

whitePaper | April 14, 2022

A connected machine ecosystem comprises industrial assets interlinked via software and intelligent technologies, to drive smarter and more agile decisions. Industry 4.0, a revolution driven by advancements in technology, integrates physical operations with smart digital technologies (such as AI, industrial IoT, blockchain, connectivity infrastructure, etc.) to create a more holistic, interconnected.

Read More
news image

Scaling IoT Solutions through the Power of Strategic Alliance

whitePaper | May 4, 2022

The COVID-19 pandemic has undoubtedly pushed organizations over the tipping point for digital transformation. The growing need for remote access, online monitoring, distributed manufacturing processes, and predictive maintenance is accelerating the adoption of next generation technologies by years.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More

Spotlight

Applied Materials

Applied Materials is the global leader in materials engineering solutions for the semiconductor, flat panel display and solar PV industries. Our technologies help make innovations like smartphones, flat screen TVs and solar panels more affordable and accessible to consumers and businesses around the world.

Events