Gemalto M2M Experts - MIMs and MIM Services

LAETITIA JAY | March 1, 2016

article image
Laetitia Jay leads marketing for Gemalto M2M's solutions and services. Watch as she takes us through the M2M value chain, helping you to address key challenges while deploying applications in the M2M market and giving answers to questions like: How to monitor the quality of services, that you bring to your customers? How to increase the security level of your infrastructure? How to speed up the deployment of your M2M applications?

Spotlight

Graylog2

Graylog is a fully integrated open source log management platform for collecting, indexing, and analyzing both structured and unstructured data from almost any source. Non Graylog-authored components Include MongoDB for metadata and Elasticsearch for log file storage and text search. Content packs are bundles of Graylog2 input, extractor, stream, dashboard and output configurations that can provide full support for a data source. Some content packs are shipped with Graylog2 by default and some are available from graylog2.org. Packs that were downloaded from this website can be imported using the Graylog2 web interface.

OTHER ARTICLES

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Finding and Fixing Blind Spots in Enterprise IoT Security

Article | June 2, 2021

The Internet of Things has been a breakthrough, and adoption rates keep exploding. There are possibly over 20 billion IoT devices in the world, and by 2025, there may have been 75 billion. Even though there has been a rise in smart home devices, most IoT devices are found in businesses, industries, and healthcare. The benefits are overwhelming: from enabling automation of repetitive tasks (both simple and complex), to real-time data insights and analytics, IoT devices make workers more productive, improve customer experience, and reduce operating costs. However, with the many benefits of IoT devices come serious disadvantages, chief of which is security. Here are some reasons why IoT devices have such serious security risks:

Read More

What Is CBRS and How Does It Help IoT?

Article | June 2, 2021

The Internet of Things continues to grow fueled by applications that solve problems for enterprise customers. One of the biggest barriers to IoT solutions in enterprise settings is reliable and low-cost wireless connectivity. Where Wi-Fi, Bluetooth, LoRa, Zigbee and others have tried to solve the problem before, CBRS (Citizens Broadband Radio Service) is posed to offer a viable alternative for enterprise IoT connectivity. Specific to the United States, Citizen’s Broadband Radio Service (CBRS) is a piece of the radio spectrum between 3550 – 3700 MHz. This is a valuable area of the spectrum because it allows good propagation (ability to penetrate walls and go medium distances) with the benefits of higher bandwidth services, such as LTE and 5G.

Read More

Scalable Software with Devops for Industrial IoT

Article | June 2, 2021

Scaling Industrial IoT (IIoT) solutions requires a DevOps organization that can manage increased software and hardware complexity in terms of capability, capacity and footprint. DevOps is derived from Development and Operations and is one of the buzz words for ICT companies. Often it is the amalgamation of Software Developers from R&D and senior engineers from Operations into a new organization. Startups are faced with the challenge of how to quickly create a functioning DevOps organization that can scale with rapid growth. In this article, we will deal with the keys for success to scale software solutions with using an example of an Industrial IoT solution. We will look at how DevOps should function and discuss the important principles for software development, tools and operations.

Read More

Spotlight

Graylog2

Graylog is a fully integrated open source log management platform for collecting, indexing, and analyzing both structured and unstructured data from almost any source. Non Graylog-authored components Include MongoDB for metadata and Elasticsearch for log file storage and text search. Content packs are bundles of Graylog2 input, extractor, stream, dashboard and output configurations that can provide full support for a data source. Some content packs are shipped with Graylog2 by default and some are available from graylog2.org. Packs that were downloaded from this website can be imported using the Graylog2 web interface.

Events