How AI and IoT are Affecting the Insurance Industry

Together with the latest internet of things (IoT) devices, artificial intelligence (AI) has already begun to change the universe of insurance not only by making it more affordable, but by making accessibility and underwriting much better. There are some that even believe that someday, insurance itself might become a thing of the past. Machine learning paired with complex AI algorithms hold the ability to completely transform practically any industry. To say the least, the insurance industry is not an exception. Since its inception, the insurance industry has been powered by mathematics; originally only an underwriter could calculate reliable risk rates and offer acceptable payouts that would not shut down the insurance company. With the advancement of AI, it is possible to employ it to repeatable operations that are based on logic and mathematics at a higher reliability rate than that done by humans. The true question is how the insurance industry will take advantage of AI, and how it will affect the future of the insurance industry.

Spotlight

SAP Concur

SAP Concur takes companies of all sizes and stages beyond automation to a completely connected spend management solution encompassing travel, expense, invoice, compliance and risk. Our global expertise, industry-leading innovation and dynamic ecosystem of diverse partners and applications unlock powerful insights that help businesses reduce complexity and see spending clearly, so they can manage it proactively.

OTHER ARTICLES
Industrial IoT, IoT Security

Unlocking the IoT Potential with AI

Article | July 11, 2023

Artificial intelligence is becoming increasingly crucial in IoT applications and deployments. Over the past two years, investments and acquisitions in firms that combine AI and IoT have increased. IoT platform software from top suppliers now includes integrated AI features, including machine learning-based analytics. When artificial intelligence is linked with the internet of things, we get Artificial Intelligence of Things (AIoT). The prime motive for combining AI and IoT is that, while IoT devices are used to gather data and send it to a cloud or other location where it can be stored using the internet, AI, which is regarded as the brain of AIoT, is what actually aids in decision-making and simulates how machines would act or react. Other artificial intelligence (AI) tools, such as speech recognition and computer vision, can assist reveal patterns in data that previously needed human evaluation. AI applications for IoT-enabled companies help them avoid several issues: Preventing expensive unplanned downtime Predictive maintenance can lessen the adverse economic effects of unplanned downtime by employing analytics to anticipate equipment failure and arrange orderly maintenance processes. In order to predict equipment failure, machine learning enables the discovery of patterns in the continuous streams of data produced by today's technology. Operational efficiency advancement IoT with AI capabilities can also increase operational effectiveness. By processing continuous data streams to find patterns invisible to the human eye and not visible on simple gauges, machine learning can predict operating conditions and identify parameters that need to be adjusted immediately to maintain ideal results, just as it can predict equipment failure. Improved risk management IoT and AI-powered applications enable businesses to automate for quick reaction, better analyze and predict a range of hazards, and control worker safety, financial loss, and cyber threats. Finding an IoT system that does not incorporate AI could soon be uncommon. With the help of AI, organizations can truly enhance the potential IoT and effectively put it into use for improving the overall functioning.

Read More
IoT Security

Top Technologies in IoT Network Security for Network Resilience

Article | July 5, 2023

Building resilient IoT networks: Exploring the top technologies for enhancing IoT security and protecting as well as safeguarding against evolving cyber threats in the interconnected era of Industry 4.0. Contents 1. What is Network Resilience and Why is it Needed? 1.1 Continuous Operation 1.2 Mitigating Security Threats 1.3 Data Protection 1.4 System Availability 1.5 Risk Management 1.6 Regulatory Compliance 2. Factors to Consider for Network Resilience 3. Top Trends in IoT Security 3.1 Zero Trust and AI 3.2 Supply Chain Security 3.3 Network Segmentation and Segregation 3.4 Over-the-Air (OTA) Updates 3.5 Device Authentication and Authorization 3.6 Software-defined Networking (SDN) Security 3.7 Identity and Access Management (IAM) 4. Conclusion 1. What is Network Resilience and Why is it Needed? Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. It involves implementing measures to ensure the network remains available, reliable, and secure, even during security threats or unexpected events. Ensuring network resilience is a critical aspect of IoT network security. Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. Ensuring network resilience in IoT network security is crucial for the following reasons: 1.1 Continuous Operation IoT networks often support critical applications and services that require uninterrupted operation. Network resilience ensures that these applications can continue functioning even during disruptions, such as network failures or security incidents. It minimizes downtime and ensures business continuity. 1.2 Mitigating Security Threats IoT networks are susceptible to various cybersecurity threats, including malware, unauthorized access, or Distributed Denial of Service (DDoS) attacks. Network resilience measures help mitigate these threats by implementing security controls, monitoring network traffic, and enabling prompt detection and response to security incidents. 1.3 Data Protection IoT devices generate and transmit vast amounts of sensitive data. Network resilience safeguards data integrity, confidentiality, and availability by implementing secure communication protocols, encryption mechanisms, and access controls. It ensures that data remains protected even during network disruptions or security breaches. 1.4 System Availability IoT systems often rely on real-time data processing and communication. Network resilience ensures that data flows seamlessly, allowing IoT devices to exchange information and execute tasks without interruptions. It supports critical functions such as monitoring, control, and decision-making processes. 1.5 Risk Management Building network resilience helps organizations effectively manage risks associated with IoT deployments. By identifying vulnerabilities, implementing protective measures, and having response plans in place, organizations can minimize the impact of security incidents, reduce financial losses, and maintain the trust of stakeholders. 1.6 Regulatory Compliance Many industries have specific regulations and standards governing the security and resilience of IoT networks. By ensuring network resilience, organizations can demonstrate compliance with these requirements, avoiding penalties, legal issues, and reputational damage. 2. Factors to Consider for Network Resilience Implementing redundancy and failover mechanisms within the network infrastructure helps mitigate the impact of single points of failure. This involves deploying backup systems, redundant network paths, and failover mechanisms to ensure continuous operation despite a failure or attack. Traffic Monitoring and Anomaly Detection for Continuous network traffic monitoring helps identify abnormal patterns or behaviours that may indicate security threats or attacks. By leveraging intrusion detection and prevention systems (IDPS) and traffic analysis tools, organizations can promptly detect and respond to network anomalies, safeguarding network resilience. Moreover, segmentation and Isolation: Dividing the IoT network into segments or zones and isolating critical devices or systems from less secure ones enhances network resilience. Implementing proper network segmentation, VLANs (Virtual Local Area Networks), or software-defined networking (SDN) enables effective control, containment, and mitigation of security incidents. DDoS attacks significantly threaten network resilience by overwhelming the network's resources and causing service disruption. Deploying robust DDoS protection measures, such as traffic filtering, rate limiting, and traffic diversion, helps mitigate the impact of such attacks and ensures network availability. Incident Response and Establishing comprehensive incident response and recovery plans specific to IoT network security incidents is crucial. These plans should outline clear procedures, roles, and responsibilities to efficiently respond to and recover from security breaches or disruptions, minimizing downtime and maintaining network resilience. In addition, regular penetration testing, vulnerability assessments, and network audits help identify weaknesses and vulnerabilities in the IoT network infrastructure. Promptly addressing these issues through patches, updates, and security configuration adjustments strengthens network resilience by proactively addressing potential security risks. By implementing these measures, organizations can enhance the resilience of their IoT networks, ensuring continuous operation, prompt threat detection, and effective response to security incidents. Network resilience plays a vital role in maintaining IoT systems' integrity, availability, and reliability in the face of evolving security challenges. 3. Top Trends in IoT Security 3.1 Zero Trust and AI Zero Trust is an emerging security concept that assumes no implicit trust towards devices or users, even if they are already inside the network perimeter. Implementing Zero Trust principles in IoT networks can help mitigate the risks associated with compromised devices and unauthorized access for IoT security. In order to bolster cybersecurity measures, adopting a zero trust approach. Effectively addressing cybersecurity challenges entails not merely technological solutions but a comprehensive organizational strategy rooted in cultural and policy frameworks. Emphasizing the zero trust concept underscores the importance of policy implementation throughout the entire organization, complementing technological measures. 3.2 Supply Chain Security The complex and interconnected nature of IoT supply chains introduces security risks. The supply chain for IoT devices involves multiple stages, including device manufacturing, software development, distribution, and deployment. Each stage presents potential security risks that can compromise the integrity and security of the IoT network. This includes adopting secure supply chain management practices, such as verifying the security practices of suppliers and manufacturers, and establishing clear security requirements and standards for the entire supply chain. Conducting third-party risk assessments helps evaluate the security posture of suppliers and vendors to identify any potential vulnerabilities or weaknesses. 3.3 Network Segmentation and Segregation In IoT security, minimizing the potential impact of a compromised IoT device is crucial, and network segmentation and segregation play a vital role in achieving this goal. Network segmentation involves dividing the network into separate zones or segments, based on factors such as device type, functionality, or security requirements. The containment strategy helps minimize the impact of a security breach by isolating compromised devices and preventing lateral movement within the network. 3.4 Over-the-Air (OTA) Updates Software updates play a critical role in maintaining the integrity and security of IoT devices. IoT devices frequently require updates to address software bugs, patch vulnerabilities, or introduce new features. Over-the-Air (OTA) update mechanisms are being enhanced with robust security measures to ensure the secure delivery and installation of updates. Code signing is a prevalent practice where updates are digitally signed with cryptographic keys to verify the authenticity and integrity of the software. Secure boot is another important mechanism that establishes a chain of trust during the device boot-up process, ensuring that only authorized and tamper-free software is loaded onto the device. 3.5 Device Authentication and Authorization The increasing number of IoT devices poses a significant challenge in ensuring secure and trusted authentication and authorization. Two-factor authentication (2FA), for example, adds an extra layer of protection by requiring users or devices to provide two separate forms of authentication, such as a password and a unique code sent to a mobile device. Digital certificates, on the other hand, enable secure and trusted device authentication by leveraging public key infrastructure (PKI) technology. Each IoT device is issued a unique digital certificate, which serves as a digital identity, allowing for secure communication and verification of device authenticity. 3.6 Software-defined Networking (SDN) Security Securing Software-defined Networking (SDN) environments is paramount to protect IoT deployments. SDN offers centralized control and management of network resources, providing flexibility and scalability. This ensures that only authorized entities can access and make changes to the SDN infrastructure, preventing unauthorized access and configuration changes. Additionally, continuous traffic monitoring and analysis enable the detection of suspicious activities and potential security breaches. Encryption IoT standards and protocols should be employed to secure communication between the SDN controller, switches, and IoT devices, safeguarding data privacy and integrity. Network segmentation within the SDN environment helps limit the impact of security breaches, reducing the attack surface. 3.7 Identity and Access Management (IAM) Implementing IAM solutions, such as role-based access control (RBAC) and multi-factor authentication (MFA), within IoT networks significantly enhances network security. IAM ensures that only authorized individuals can access and interact with IoT devices and systems. RBAC enables administrators to assign specific access privileges based on user roles and responsibilities, reducing the risk of unauthorized access. Additionally, incorporating MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a unique token or biometric verification. This significantly reduces the risk of unauthorized access even if a user's credentials are compromised. 4. Conclusion The technologies discussed in this article play a crucial role in enhancing IoT network security and resilience. By leveraging these technologies, organizations can mitigate the risks associated with IoT deployments, protect against cyber threats, and ensure the reliability and continuity of their IoT networks. As the IoT landscape evolves, staying up-to-date with these top technologies will be essential for organizations to maintain a robust and secure IoT infrastructure. The transformative landscape of Industry 4.0 demands strong network security in IoT environments. The top technologies discussed in this article empower organizations to enhance network resilience, protect against cyber threats, and ensure the uninterrupted functioning of IoT networks. Embracing these technologies and staying ahead of emerging threats, helps organizations build a secure foundation for their IoT deployments and capitalize on the vast opportunities offered by the IoT ecosystem.

Read More
IoT Security

The IoT and Edge Computing Partnership

Article | June 28, 2023

Edge computing enables the IoT to move intelligence out to the edge. If organizations have a lot of data and need to use it, they should do so in end-to-end paths, environments with lots of sensors, or environments where a lot of data is generated at the edge, thanks to the Internet of Things (IoT) and edge data sensing. Additionally, traditional methodologies fall short of the necessary standards when dealing with real-time information and the growing amount of unstructured data, which includes a sensor and IoT data. For management, power concerns, analytics, real-time needs, and other IoT situations, speed and high-speed data are essential elements. This enables edge computing to handle data. The Internet of Things (IoT) benefits from having compute capacity close to the location of a physical device or data source. IoT device data needs to be processed at the edge rather than traveling back to a central site before that analysis can be done in order to react quickly or prevent concerns. For the data processing and storage requirements of IoT devices, edge computing serves as a local source. Benefits of Using IoT and Edge Together The connection between IoT devices and the main IT networks has less latency. Greater operational efficiency and quicker response times. Network bandwidth improvement. When a network connection is lost, the system continues to run offline. Utilizing analytics algorithms and machine learning, local data processing, aggregation, and quick decision-making are possible. Industrial IoT, often known as IIoT, is the application of IoT in an industrial setting, such as factory machinery. Consider the lifespan of the large, factory-used machinery. Equipment may be stressed differently over time depending on the user, and malfunctions are a regular aspect of operations. The parts of the machinery that are most prone to damage or misuse can be equipped with IoT sensors. Predictive maintenance can be performed using the data from these sensors, cutting down on overall downtime. Because IoT devices can be used as Edge Computing, the line between IoT and Edge Computing can occasionally be razor-thin. However, the most significant difference is the ability not only to compute data locally (in real-time) but also to sync that data to a centralized server at a time when it is safe—and feasible—to send. IoT and edge computing are both here to stay since they fulfill crucial societal and commercial needs.

Read More
Enterprise Iot

How to Secure Your Network with Zero Trust Security for IoT?

Article | July 19, 2022

The concept of "never trust, always verify" is the foundation of the relatively new security architecture known as "zero trust." Zero trust requires that all users and devices be verified every time they connect, even from inside the "moat," in contrast to the conventional castle-and-moat security architecture, which automatically trusts users and devices located within a network's perimeter. Companies are being forced to reconsider how they safeguard their networks by the internet of things (IoT). Unmanaged smart gadgets connected to the internet expand the number of potential access points for hackers to compromise your security when they are added to a network. Zero Trust Security Expansion for IoT After establishing it for users and their devices, organizations must extend zero-trust security to cover unmanaged, non-user devices too. To do this, they require zero trust identity management technologies that automatically register devices, issue credentials, and offer password-less authentication. Device Visibility A device may be infected with malware or have a security breach if performance problems or bugs start to appear frequently. In addition, a malfunctioning device may be more vulnerable to attack. Therefore, organizations require device health monitoring that can automatically identify problems and flag them for remedy in order to establish and maintain zero trust security for IoT. Some cutting-edge solutions can also automatically prevent an impacted device from making further connection attempts or carrying out corrective actions without requiring human participation. The Principle of Least Privilege (PoLP) The principle of least privilege (PoLP), which argues that any user or device should only obtain the bare minimum access privileges necessary to perform their job functions, is widely used in conjunction with zero trust security. Therefore, organizations must establish the minimal level of network access required for each device to carry out its functions before limiting its potential privileges in order to deploy PoLP for IoT. Implementing identity and access management (IAM) tools and guidelines that support zero trust and PoLP for devices is one approach to accomplishing this. Security Monitoring There are other zero-trust security monitoring programs created especially for IoT, such as Palo Alto Networks' IoT Security, which was previously discussed. Businesses can also utilize tools to monitor devices and network traffic, such as next-generation firewalls and intrusion detection and prevention systems (IDS/IPS). The zero trust security solution for IoT must include monitoring in addition to as much automation as possible so that threats can be identified, contained, and remedied even when no one is there to press a button or disconnect a device manually. One of the leading causes of zero trust security projects failing over time is that people stop adhering to them once they get complicated. This is especially true for IoT security that operates on zero trust. In addition, it can be logistically challenging to keep remote, unmanaged devices at zero trust.

Read More

Spotlight

SAP Concur

SAP Concur takes companies of all sizes and stages beyond automation to a completely connected spend management solution encompassing travel, expense, invoice, compliance and risk. Our global expertise, industry-leading innovation and dynamic ecosystem of diverse partners and applications unlock powerful insights that help businesses reduce complexity and see spending clearly, so they can manage it proactively.

Related News

Software and Tools

Knorr-Bremse is Nexxiot's new client and strategic investor

Nexxiot | June 01, 2022

Nexxiot, the global TradeTech pioneer, welcomed Knorr-Bremse as a new customer and strategic investor. Knorr-Bremse is the global market leader for brake systems and other rail and commercial vehicle systems. Knorr-Bremse and its North American subsidiaries New York Air Brake and Knorr Brake Company will integrate Nexxiot's IoT hardware and software into future rail products and systems, proactively driving digital connectivity into its vast railroad customer base, in a major deal that will shape the future of rail transportation. Knorr-customers Bremse's will benefit from higher vehicle availability, optimized lifetime costs, and greater operational efficiency by linking their rail brakes, doors, HVAC, sanitary, and other systems to Nexxiot's digital environment. The company will also solidify its position as one of the most innovative rail providers, providing clients with appealing new insights and digital services. Knorr-Bremse joins Nexxiot as a strategic minority investor. Existing shareholders and the leading investment management firm QVIDTVM, directed by Burak Alici, have increased their holdings. "As a core element in our strategy, we're using digitalization to leverage our already strong position in safety- and mission-critical rail vehicle systems, and to generate further growth and strong profitability. Together with Nexxiot's dedicated team, we're now pressing ahead with our ambition to add further value for our customers. By combining our systems technology with Nexxiot's digital ecosystem, we're creating a win-win scenario that will boost vehicle availability and lower the total cost of fleet ownership by leveraging a new generation of data-based services," explains Dr. Jürgen Wilder, Member of the Executive Board of Knorr-Bremse AG and responsible for the Rail Vehicle Systems division. "This partnership with Knorr-Bremse, a leading supplier of rail vehicle systems, will help us build the best products and services for the industry. Together, we aim to accelerate the digitalization of key areas like rail freight and automation services. At the same time, we'll also be able to speed up our own expansion in the rail industry and continue our strong growth, Specifically, our sensors and scalable cloud-based platform help turn rolling stock assets into connected, data-generating industrial objects. Leveraging rail data in real-time will be a key success factor in helping make rail and rail services fit for the future." Stefan Kalmund, CEO of Nexxiot The Nexxiot Globehopper LINK gadget, which checks the status of some of the most critical sections of a railcar, such as doors and brakes, and sends the data to the cloud, will be deployed by Knorr-Bremse. Nexxiot uses unique algorithms and Big Data analytics to transform this data into new business information and data-driven services for all stakeholders in the value chain. This Internet of Things technology will enable operators to automate important business processes and get a wealth of new insights, resulting in a significant increase in efficiency, sustainability, customer service, and profitability. Train parts that haven't been monitored in real time are now visible and accessible digitally.

Read More

AWS Announces Snowcone Edge Computing Box for IoT

Amazon | June 20, 2020

Amazon Web Services an Amazon.com company announced AWS Snowcone, a new small, ultra-portable, rugged, and secure edge computing and data transfer device. Millions of customers have applications that rely on AWS for data processing, analytics, storage, IoT, and machine learning capabilities. With support for AWS IoT Greengrass, the ability to run Amazon Elastic Compute Cloud instances, and ample local storage, AWS Snowcone can be used as an IoT hub, data aggregation point, application monitor, or lightweight analytics engine. Today, Amazon Web Services, Inc. an Amazon.com company, announced AWS Snowcone, a new small, ultra-portable, rugged, and secure edge computing and data transfer device. At under 5 lbs and able to fit in a standard mailbox or a small backpack, AWS Snowcone is the smallest member of the AWS Snow Family of devices, enabling customers to collect data, process it locally, and move it to AWS either offline (by shipping the device to AWS) or online (by using AWS DataSync to send the data to AWS over the network). AWS Snowcone is built to withstand harsh conditions and is designed for a variety of use cases in environments outside of the traditional data center that lack consistent network connectivity and/or require portability, including healthcare, industrial IoT, drones, tactical edge computing, content distribution, data migration, video content creation, and transportation. Millions of customers have applications that rely on AWS for data processing, analytics, storage, IoT, and machine learning capabilities. Increasingly, edge computing use cases (like machine learning inference, industrial IoT, and autonomous machines) drive customers' need to move data capture, processing, and analysis closer to end users and devices. Running applications in disconnected environments or connected edge locations can be challenging because often these locations lack the space, power, and cooling common in data centers. Today, customers use the AWS Snow Family (a collection of physical devices designed to run outside the data center and ranging in size from the suitcase-sized AWS Snowball to the 45-foot long ruggedized shipping container AWS Snowmobile) to collect and process data, run local computing applications, and move large volumes of data from log files, digital media, genomic data, and sensor data from connected devices to AWS. As customers seek to extend the reach of their cloud infrastructure into more edge locations, new use cases are emerging for edge computing in more situations like vehicles (land, sea, and air), industrial operations, and remote and austere sites that require a rugged and secure device with even greater portability and a smaller form factor than the AWS Snow Family of devices has traditionally provided. Read More: ReFirm Labs Announces Spring 2020 Release of its IoT Firmware Security Platform – Centrifuge AWS Snowcone provides maximum flexibility for edge computing environments, offering a small, ultra-portable, rugged, and military grade secure device to run applications and migrate data to AWS. AWS Snowcone measures 9 inches x 6 inches x 3 inches (23 cm x 15 cm x 8 cm) and weighs 4.5 lbs (2.1 kg). The device can easily fit in a backpack or messenger bag, standard mailbox, or any type of vehicle, and is light enough to be carried by drone. AWS Snowcone can move data to AWS offline by shipping the device (using its E Ink shipping label) and online using Ethernet or Wi-Fi with AWS DataSync, which are integrated into the device. AWS Snowcone features 2 CPUs, 4 GB of memory, 8 TB of storage, and USB-C power (or optional battery). AWS Snowcone is designed to operate in extreme environments or disconnected remote sites (including oil rigs, first responder vehicles, military operations, factory floors, remote offices, hospitals, or movie theaters) for long periods of time without traditional data center conditions. With support for AWS IoT Greengrass, the ability to run Amazon Elastic Compute Cloud (Amazon EC2) instances, and ample local storage, AWS Snowcone can be used as an IoT hub, data aggregation point, application monitor, or lightweight analytics engine. Thousands of our customers have found AWS Snowball devices to be ideal for collecting data and running applications in remote and harsh environments. Since 2015, customer use of Snowball devices has greatly increased, as has their need for an even smaller device with even greater portability. With more applications running at the edge for an expanding range of use cases, like analyzing IoT sensor data and machine learning inference, AWS Snowcone makes it easier to collect, store, pre-process, and transfer data from harsh environments with limited space to AWS for more intensive processing, Bill Vass, VP of Storage, Automation and Management Services, AWS. Like other AWS Snow Family devices, all data on AWS Snowcone is encrypted using military grade 256-bit keys that customers can manage using the AWS Key Management Service (KMS). Additionally, AWS Snowcone contains anti-tamper and tamper-evident features to help ensure data on the device stays secure during transit. AWS Snowcone meets stringent ruggedization standards (it meets ISTA-3A, ASTM D4169, and MIL-STD-810G standards) for free-fall shock and operational vibration. The device is dust-tight and water resistant (it meets the IP65 International Protection Marking IEC standard). AWS Snowcone has a wide operating temperature range from freezing (0 degrees C/32 degrees F) to desert-like conditions (38 degrees C/100 degrees F), and withstands even harsher temperatures when in storage or being shipped (-32 degrees C/-25.6 degrees F to 63 degrees C/145.4 degrees F). Setting up an AWS Snowcone takes only 3 clicks, and once set-up, the device is easily used and managed through a simple-to-use graphical interface. AWS Snowcone is available in the US East (Northern Virginia) and US West (Oregon) AWS Regions, with availability planned in additional AWS Regions in the coming months. Deluxe Entertainment Services (Deluxe) is the world's leading video creation-to-distribution company offering global, end-to-end services and technology. "Our work with AWS is a fundamental part of Deluxe's strategy. One VZN, our new cloud-based IP delivery solution, is a leap in innovation for digital cinema distribution which has been stagnant over the past decade, fundamentally changing not only the economics of film distribution for exhibitors and studios around the globe, but enabling new theatrical experiences for viewers as well," said Andy Shenkler, Chief Product and Technology Officer, Deluxe. "The combination of AWS Snowcone, AWS DataSync, and Amazon S3 are essential to One VZN – the collective services distinguish themselves from any other cloud offerings today. The secure, compact AWS Snowcone device, in conjunction with Deluxe's powerful cloud-based solutions create a truly differentiated solution of the industry." SmugMug+Flickr is the world's largest and most influential photographer-centric platform. "For over a decade SmugMug has been storing billions of photos and videos for our millions of users in an accessible, available, and secure way using Amazon S3. With the introduction of AWS Snowcone, our customers now have a small, ultra-portable device with 8 terabytes of storage that allows them to capture more content during a photography or videography shoot, process the data locally, and then upload it to the cloud faster than ever," Don MacAskill, CEO & Chief Geek, SmugMug and Flickr. "AWS Snowcone's small form factor and rugged, secure design allows us to simply ship these devices to customers so they can seamlessly copy and preserve their precious and valuable media whether in the comfort of their own home or out on a shoot off the grid in jungles, deserts, forests, mountains, in the middle of the ocean, and even in drone use cases. Customers can then ship the device back to AWS or retain the device for multiple shoots all while transferring their data online with AWS DataSync. AWS Snowcone helps our users and photographers effortlessly and flexibly share their passion, work, and inspiration with each other leveraging the SmugMug platform." Federated Wireless leads the industry in development of shared spectrum Citizens Broadband Radio Service (CBRS) capabilities. The company's partner ecosystem includes more than 40 device manufacturers along with cloud edge partners, dedicated to collaborate for the advancement of CBRS services. "The combination of AWS Snowcone and the Federated Wireless Connectivity-as-a-Service private wireless solution enables an expansive variety of new business models and indoor and outdoor scenarios at the edge of the cloud, and even beyond the edge of the network," said Iyad Tarazi, President and CEO of Federated Wireless. "The small form factor and robust capabilities of Snowcone provides us more flexibility in our technology architecture. The simplified, innovative delivery and proven cloud capabilities of the combined solution give organizations of all types and sizes the security, compute power, portability, and mobility they need to meet their most pressing business and operational objectives." Novetta is an advanced analytics solutions company focused on mission success for its customers in the public sector, defense, intelligence, and federal law enforcement communities. AWS is leading in the development of practical, mission-ready edge computing technology that we use to build solutions to help our public sector clients save lives. AWS Snowcone is a great example of AWS innovation for the edge. Snowcone gives us a rugged, secure, and portable edge computing platform that we can use in disaster zones and austere edge locations. In our recent field exercises, Snowcone performed admirably as a sensor hub at the edge to track people and assets in a disaster zone, Rob Sheen, Senior Vice President, Client Operations at Novetta. CommScope pushes the boundaries of technology to create the world's most advanced wired and wireless networks. "Companies looking to deploy private LTE networks and need simple, easy install solutions will find AWS Snowcone, coupled with the CommScope CBRS portfolio, function as an optimal pairing in solving business challenges. Snowcone is a perfect fit for powering up 100s of edge network devices with private LTE mobility," said Upendra Pingle, Vice President, Distributed Coverage and Capacity Solutions, CommScope. "As an AWS technology partner, CommScope's CBRS solutions, including our Spectrum Access System and Radio Access Network offerings, will easily integrate for quick, frictionless deployments that give users total control of their data. The Snowcone device enables us to continue driving further innovations in our CBRS solutions all while transforming the barrier to entry for private LTE networks." Read More: SDSol Technologies Provides an Overview of How IoT Can Transform Your Business About Amazon Web Services Launched in 2006, Amazon Web Services began exposing key infrastructure services to businesses in the form of web services now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure expenses into variable costs. Businesses no longer need to plan and procure servers and other IT resources weeks or months in advance. Using AWS, businesses can take advantage of Amazon's expertise and economies of scale to access resources when their business needs them, delivering results faster and at a lower cost.

Read More

ReFirm Labs Announces Spring 2020 Release of its IoT Firmware Security Platform – Centrifuge

ReFirm Labs | June 19, 2020

ReFirm Labs, a provider of the industry’s first proactive IoT and firmware security solutions. IoT device manufacturers and users can automate compliance checks against new IoT security standards and regulations while protecting against emerging cyber and supply chain threats. Centrifuge continues to enhance the capabilities of its platform and introduces automated compliance reporting to address the rapidly increasing number of IoT industry standards and regulatory requirements. ReFirm Labs, a provider of the industry’s first proactive IoT and firmware security solutions, today announced the Spring 2020 release of its flagship Centrifuge Platform®. Centrifuge vets, validates and continuously monitors the security of firmware - the software that runs IoT devices - to protect against emerging cyber threats. With this new release, Centrifuge continues to enhance the capabilities of its platform and introduces automated compliance reporting to address the rapidly increasing number of IoT industry standards and regulatory requirements. Widely recognized as a pressing cybersecurity issue, firmware is a major unprotected attack surface that hackers use to get a foothold and move laterally into corporate or critical infrastructure networks. A host of emerging standards and regulations are being developed to address this threat by enforcing proper cyber hygiene by IoT device manufacturers. Recently both the US Cyberspace Solarium Commission and the NIST Cybersecurity for IoT Program released reports recommending stronger regulatory enforcement and clearer baseline standards and guidance for IoT device manufacturers and their supply chains in order to defend the country against cyberattacks. The Solarium report recommended Congress pass laws making device manufacturers liable for delivering products with known vulnerabilities. Read More: SDSol Technologies Provides an Overview of How IoT Can Transform Your Business IoT firmware is the next big attack vector. Yet IoT device manufacturers and users alike struggle to demonstrate compliance with these emerging standards and regulations due to the complicated, time intensive and expensive cybersecurity assessment process for these products. Device manufacturers also need visibility into the security of third-party components from their supply chain. Automation of these assessments and validation early in the development process is the key to trust and managing risk throughout the IoT ecosystem, Derick Naef, CEO of ReFirm Labs. He adds, “Just as organizations require a show of security and compliance due diligence for their enterprise applications, so should they be doing for their IoT devices.” The Spring ’20 release of ReFirm Labs’ Centrifuge Platform introduces major new capabilities that expand the firmware security analysis platform to help automate and address the compliance and certification needs of embedded systems. Updates include: • Security Policy and Standards Compliance Validation: To help IoT device manufacturers integrate security policies into their quality checks and development process, these security policies can be defined and automatically checked against the Centrifuge analysis results. The new Centrifuge Policy Engine quickly determines if a product release is compliant, which saves time and money before starting an expensive and time consuming certification process. In addition, manufacturers can now enforce security compliance when receiving code from third parties before they accept new releases. And product security teams can quickly evaluate compliance before that equipment is placed on the network. Security policies can be customized and mapped to any one of the emerging security standards to verify standards compliance. • Firmware Comparison for Supply Chain Visibility: To address Cyber Supply Chain Risks, Centrifuge now supports firmware differencing. Product security teams can get a detailed view of what has changed between releases or within equipment in the field. This reduces the time required to conduct product security assessments. Now security analysts can focus on just those components that changed or identify changes they were not expecting. Automated firmware differencing provides a key capability to organizations standing up Cyber Supply Chain Risk Management programs as required by emerging industry regulations. Other key improvements to Centrifuge’s core security analysis capabilities include: • Speed: Dramatically improved firmware extraction & analysis speed in some cases 10x faster • Expanded vulnerability coverage: 10 new analyzers for detecting known vulnerabilities in open source components, including Bluetooth, UPnP, and a variety of SSL security libraries • Expanded exploit coverage: 4 new detectors to identify exploits, including CABLEHAUNT and HiSilicon backdoors • PowerPC support: Binary analysis of firmware built for the PowerPC CPU architecture • Enhanced security: Support for two-factor authentication Highly scalable, automated and cloud-based, the Centrifuge Platform is a simple and reliable way for monitoring security across an entire system of deployed IoT devices without the need for agents or access to the network itself. Centrifuge has been proven to increase productivity for security teams while reducing the number of breaches on internet-connected devices. Read More: Canuc Signs MoU with M3SH Technologies for IoT Equipment Distribution About ReFirm Labs ReFirm Labs provides the industry's first IoT and firmware security solutions that proactively vet, validate and continuously monitor IoT devices from hidden threats. Its flagship product, Centrifuge Platform®, detects and reports potential zero-day vulnerabilities, hidden crypto keys, backdoor passwords and known vulnerabilities in IoT devices without needing access to source code. ReFirm Labs' technology has been proven to provide the insight and intelligence needed for users to proactively defend connected devices and maintain compliance and the integrity of supply chain security. Founded by a team of former NSA offensive cyber operators, ReFirm Labs is trusted by government agencies and Fortune 500 companies that operate in a wide variety of industries, including: telecommunications, cloud infrastructure and data centers, automotive, health care, utilities, and manufacturing.

Read More

Software and Tools

Knorr-Bremse is Nexxiot's new client and strategic investor

Nexxiot | June 01, 2022

Nexxiot, the global TradeTech pioneer, welcomed Knorr-Bremse as a new customer and strategic investor. Knorr-Bremse is the global market leader for brake systems and other rail and commercial vehicle systems. Knorr-Bremse and its North American subsidiaries New York Air Brake and Knorr Brake Company will integrate Nexxiot's IoT hardware and software into future rail products and systems, proactively driving digital connectivity into its vast railroad customer base, in a major deal that will shape the future of rail transportation. Knorr-customers Bremse's will benefit from higher vehicle availability, optimized lifetime costs, and greater operational efficiency by linking their rail brakes, doors, HVAC, sanitary, and other systems to Nexxiot's digital environment. The company will also solidify its position as one of the most innovative rail providers, providing clients with appealing new insights and digital services. Knorr-Bremse joins Nexxiot as a strategic minority investor. Existing shareholders and the leading investment management firm QVIDTVM, directed by Burak Alici, have increased their holdings. "As a core element in our strategy, we're using digitalization to leverage our already strong position in safety- and mission-critical rail vehicle systems, and to generate further growth and strong profitability. Together with Nexxiot's dedicated team, we're now pressing ahead with our ambition to add further value for our customers. By combining our systems technology with Nexxiot's digital ecosystem, we're creating a win-win scenario that will boost vehicle availability and lower the total cost of fleet ownership by leveraging a new generation of data-based services," explains Dr. Jürgen Wilder, Member of the Executive Board of Knorr-Bremse AG and responsible for the Rail Vehicle Systems division. "This partnership with Knorr-Bremse, a leading supplier of rail vehicle systems, will help us build the best products and services for the industry. Together, we aim to accelerate the digitalization of key areas like rail freight and automation services. At the same time, we'll also be able to speed up our own expansion in the rail industry and continue our strong growth, Specifically, our sensors and scalable cloud-based platform help turn rolling stock assets into connected, data-generating industrial objects. Leveraging rail data in real-time will be a key success factor in helping make rail and rail services fit for the future." Stefan Kalmund, CEO of Nexxiot The Nexxiot Globehopper LINK gadget, which checks the status of some of the most critical sections of a railcar, such as doors and brakes, and sends the data to the cloud, will be deployed by Knorr-Bremse. Nexxiot uses unique algorithms and Big Data analytics to transform this data into new business information and data-driven services for all stakeholders in the value chain. This Internet of Things technology will enable operators to automate important business processes and get a wealth of new insights, resulting in a significant increase in efficiency, sustainability, customer service, and profitability. Train parts that haven't been monitored in real time are now visible and accessible digitally.

Read More

AWS Announces Snowcone Edge Computing Box for IoT

Amazon | June 20, 2020

Amazon Web Services an Amazon.com company announced AWS Snowcone, a new small, ultra-portable, rugged, and secure edge computing and data transfer device. Millions of customers have applications that rely on AWS for data processing, analytics, storage, IoT, and machine learning capabilities. With support for AWS IoT Greengrass, the ability to run Amazon Elastic Compute Cloud instances, and ample local storage, AWS Snowcone can be used as an IoT hub, data aggregation point, application monitor, or lightweight analytics engine. Today, Amazon Web Services, Inc. an Amazon.com company, announced AWS Snowcone, a new small, ultra-portable, rugged, and secure edge computing and data transfer device. At under 5 lbs and able to fit in a standard mailbox or a small backpack, AWS Snowcone is the smallest member of the AWS Snow Family of devices, enabling customers to collect data, process it locally, and move it to AWS either offline (by shipping the device to AWS) or online (by using AWS DataSync to send the data to AWS over the network). AWS Snowcone is built to withstand harsh conditions and is designed for a variety of use cases in environments outside of the traditional data center that lack consistent network connectivity and/or require portability, including healthcare, industrial IoT, drones, tactical edge computing, content distribution, data migration, video content creation, and transportation. Millions of customers have applications that rely on AWS for data processing, analytics, storage, IoT, and machine learning capabilities. Increasingly, edge computing use cases (like machine learning inference, industrial IoT, and autonomous machines) drive customers' need to move data capture, processing, and analysis closer to end users and devices. Running applications in disconnected environments or connected edge locations can be challenging because often these locations lack the space, power, and cooling common in data centers. Today, customers use the AWS Snow Family (a collection of physical devices designed to run outside the data center and ranging in size from the suitcase-sized AWS Snowball to the 45-foot long ruggedized shipping container AWS Snowmobile) to collect and process data, run local computing applications, and move large volumes of data from log files, digital media, genomic data, and sensor data from connected devices to AWS. As customers seek to extend the reach of their cloud infrastructure into more edge locations, new use cases are emerging for edge computing in more situations like vehicles (land, sea, and air), industrial operations, and remote and austere sites that require a rugged and secure device with even greater portability and a smaller form factor than the AWS Snow Family of devices has traditionally provided. Read More: ReFirm Labs Announces Spring 2020 Release of its IoT Firmware Security Platform – Centrifuge AWS Snowcone provides maximum flexibility for edge computing environments, offering a small, ultra-portable, rugged, and military grade secure device to run applications and migrate data to AWS. AWS Snowcone measures 9 inches x 6 inches x 3 inches (23 cm x 15 cm x 8 cm) and weighs 4.5 lbs (2.1 kg). The device can easily fit in a backpack or messenger bag, standard mailbox, or any type of vehicle, and is light enough to be carried by drone. AWS Snowcone can move data to AWS offline by shipping the device (using its E Ink shipping label) and online using Ethernet or Wi-Fi with AWS DataSync, which are integrated into the device. AWS Snowcone features 2 CPUs, 4 GB of memory, 8 TB of storage, and USB-C power (or optional battery). AWS Snowcone is designed to operate in extreme environments or disconnected remote sites (including oil rigs, first responder vehicles, military operations, factory floors, remote offices, hospitals, or movie theaters) for long periods of time without traditional data center conditions. With support for AWS IoT Greengrass, the ability to run Amazon Elastic Compute Cloud (Amazon EC2) instances, and ample local storage, AWS Snowcone can be used as an IoT hub, data aggregation point, application monitor, or lightweight analytics engine. Thousands of our customers have found AWS Snowball devices to be ideal for collecting data and running applications in remote and harsh environments. Since 2015, customer use of Snowball devices has greatly increased, as has their need for an even smaller device with even greater portability. With more applications running at the edge for an expanding range of use cases, like analyzing IoT sensor data and machine learning inference, AWS Snowcone makes it easier to collect, store, pre-process, and transfer data from harsh environments with limited space to AWS for more intensive processing, Bill Vass, VP of Storage, Automation and Management Services, AWS. Like other AWS Snow Family devices, all data on AWS Snowcone is encrypted using military grade 256-bit keys that customers can manage using the AWS Key Management Service (KMS). Additionally, AWS Snowcone contains anti-tamper and tamper-evident features to help ensure data on the device stays secure during transit. AWS Snowcone meets stringent ruggedization standards (it meets ISTA-3A, ASTM D4169, and MIL-STD-810G standards) for free-fall shock and operational vibration. The device is dust-tight and water resistant (it meets the IP65 International Protection Marking IEC standard). AWS Snowcone has a wide operating temperature range from freezing (0 degrees C/32 degrees F) to desert-like conditions (38 degrees C/100 degrees F), and withstands even harsher temperatures when in storage or being shipped (-32 degrees C/-25.6 degrees F to 63 degrees C/145.4 degrees F). Setting up an AWS Snowcone takes only 3 clicks, and once set-up, the device is easily used and managed through a simple-to-use graphical interface. AWS Snowcone is available in the US East (Northern Virginia) and US West (Oregon) AWS Regions, with availability planned in additional AWS Regions in the coming months. Deluxe Entertainment Services (Deluxe) is the world's leading video creation-to-distribution company offering global, end-to-end services and technology. "Our work with AWS is a fundamental part of Deluxe's strategy. One VZN, our new cloud-based IP delivery solution, is a leap in innovation for digital cinema distribution which has been stagnant over the past decade, fundamentally changing not only the economics of film distribution for exhibitors and studios around the globe, but enabling new theatrical experiences for viewers as well," said Andy Shenkler, Chief Product and Technology Officer, Deluxe. "The combination of AWS Snowcone, AWS DataSync, and Amazon S3 are essential to One VZN – the collective services distinguish themselves from any other cloud offerings today. The secure, compact AWS Snowcone device, in conjunction with Deluxe's powerful cloud-based solutions create a truly differentiated solution of the industry." SmugMug+Flickr is the world's largest and most influential photographer-centric platform. "For over a decade SmugMug has been storing billions of photos and videos for our millions of users in an accessible, available, and secure way using Amazon S3. With the introduction of AWS Snowcone, our customers now have a small, ultra-portable device with 8 terabytes of storage that allows them to capture more content during a photography or videography shoot, process the data locally, and then upload it to the cloud faster than ever," Don MacAskill, CEO & Chief Geek, SmugMug and Flickr. "AWS Snowcone's small form factor and rugged, secure design allows us to simply ship these devices to customers so they can seamlessly copy and preserve their precious and valuable media whether in the comfort of their own home or out on a shoot off the grid in jungles, deserts, forests, mountains, in the middle of the ocean, and even in drone use cases. Customers can then ship the device back to AWS or retain the device for multiple shoots all while transferring their data online with AWS DataSync. AWS Snowcone helps our users and photographers effortlessly and flexibly share their passion, work, and inspiration with each other leveraging the SmugMug platform." Federated Wireless leads the industry in development of shared spectrum Citizens Broadband Radio Service (CBRS) capabilities. The company's partner ecosystem includes more than 40 device manufacturers along with cloud edge partners, dedicated to collaborate for the advancement of CBRS services. "The combination of AWS Snowcone and the Federated Wireless Connectivity-as-a-Service private wireless solution enables an expansive variety of new business models and indoor and outdoor scenarios at the edge of the cloud, and even beyond the edge of the network," said Iyad Tarazi, President and CEO of Federated Wireless. "The small form factor and robust capabilities of Snowcone provides us more flexibility in our technology architecture. The simplified, innovative delivery and proven cloud capabilities of the combined solution give organizations of all types and sizes the security, compute power, portability, and mobility they need to meet their most pressing business and operational objectives." Novetta is an advanced analytics solutions company focused on mission success for its customers in the public sector, defense, intelligence, and federal law enforcement communities. AWS is leading in the development of practical, mission-ready edge computing technology that we use to build solutions to help our public sector clients save lives. AWS Snowcone is a great example of AWS innovation for the edge. Snowcone gives us a rugged, secure, and portable edge computing platform that we can use in disaster zones and austere edge locations. In our recent field exercises, Snowcone performed admirably as a sensor hub at the edge to track people and assets in a disaster zone, Rob Sheen, Senior Vice President, Client Operations at Novetta. CommScope pushes the boundaries of technology to create the world's most advanced wired and wireless networks. "Companies looking to deploy private LTE networks and need simple, easy install solutions will find AWS Snowcone, coupled with the CommScope CBRS portfolio, function as an optimal pairing in solving business challenges. Snowcone is a perfect fit for powering up 100s of edge network devices with private LTE mobility," said Upendra Pingle, Vice President, Distributed Coverage and Capacity Solutions, CommScope. "As an AWS technology partner, CommScope's CBRS solutions, including our Spectrum Access System and Radio Access Network offerings, will easily integrate for quick, frictionless deployments that give users total control of their data. The Snowcone device enables us to continue driving further innovations in our CBRS solutions all while transforming the barrier to entry for private LTE networks." Read More: SDSol Technologies Provides an Overview of How IoT Can Transform Your Business About Amazon Web Services Launched in 2006, Amazon Web Services began exposing key infrastructure services to businesses in the form of web services now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure expenses into variable costs. Businesses no longer need to plan and procure servers and other IT resources weeks or months in advance. Using AWS, businesses can take advantage of Amazon's expertise and economies of scale to access resources when their business needs them, delivering results faster and at a lower cost.

Read More

ReFirm Labs Announces Spring 2020 Release of its IoT Firmware Security Platform – Centrifuge

ReFirm Labs | June 19, 2020

ReFirm Labs, a provider of the industry’s first proactive IoT and firmware security solutions. IoT device manufacturers and users can automate compliance checks against new IoT security standards and regulations while protecting against emerging cyber and supply chain threats. Centrifuge continues to enhance the capabilities of its platform and introduces automated compliance reporting to address the rapidly increasing number of IoT industry standards and regulatory requirements. ReFirm Labs, a provider of the industry’s first proactive IoT and firmware security solutions, today announced the Spring 2020 release of its flagship Centrifuge Platform®. Centrifuge vets, validates and continuously monitors the security of firmware - the software that runs IoT devices - to protect against emerging cyber threats. With this new release, Centrifuge continues to enhance the capabilities of its platform and introduces automated compliance reporting to address the rapidly increasing number of IoT industry standards and regulatory requirements. Widely recognized as a pressing cybersecurity issue, firmware is a major unprotected attack surface that hackers use to get a foothold and move laterally into corporate or critical infrastructure networks. A host of emerging standards and regulations are being developed to address this threat by enforcing proper cyber hygiene by IoT device manufacturers. Recently both the US Cyberspace Solarium Commission and the NIST Cybersecurity for IoT Program released reports recommending stronger regulatory enforcement and clearer baseline standards and guidance for IoT device manufacturers and their supply chains in order to defend the country against cyberattacks. The Solarium report recommended Congress pass laws making device manufacturers liable for delivering products with known vulnerabilities. Read More: SDSol Technologies Provides an Overview of How IoT Can Transform Your Business IoT firmware is the next big attack vector. Yet IoT device manufacturers and users alike struggle to demonstrate compliance with these emerging standards and regulations due to the complicated, time intensive and expensive cybersecurity assessment process for these products. Device manufacturers also need visibility into the security of third-party components from their supply chain. Automation of these assessments and validation early in the development process is the key to trust and managing risk throughout the IoT ecosystem, Derick Naef, CEO of ReFirm Labs. He adds, “Just as organizations require a show of security and compliance due diligence for their enterprise applications, so should they be doing for their IoT devices.” The Spring ’20 release of ReFirm Labs’ Centrifuge Platform introduces major new capabilities that expand the firmware security analysis platform to help automate and address the compliance and certification needs of embedded systems. Updates include: • Security Policy and Standards Compliance Validation: To help IoT device manufacturers integrate security policies into their quality checks and development process, these security policies can be defined and automatically checked against the Centrifuge analysis results. The new Centrifuge Policy Engine quickly determines if a product release is compliant, which saves time and money before starting an expensive and time consuming certification process. In addition, manufacturers can now enforce security compliance when receiving code from third parties before they accept new releases. And product security teams can quickly evaluate compliance before that equipment is placed on the network. Security policies can be customized and mapped to any one of the emerging security standards to verify standards compliance. • Firmware Comparison for Supply Chain Visibility: To address Cyber Supply Chain Risks, Centrifuge now supports firmware differencing. Product security teams can get a detailed view of what has changed between releases or within equipment in the field. This reduces the time required to conduct product security assessments. Now security analysts can focus on just those components that changed or identify changes they were not expecting. Automated firmware differencing provides a key capability to organizations standing up Cyber Supply Chain Risk Management programs as required by emerging industry regulations. Other key improvements to Centrifuge’s core security analysis capabilities include: • Speed: Dramatically improved firmware extraction & analysis speed in some cases 10x faster • Expanded vulnerability coverage: 10 new analyzers for detecting known vulnerabilities in open source components, including Bluetooth, UPnP, and a variety of SSL security libraries • Expanded exploit coverage: 4 new detectors to identify exploits, including CABLEHAUNT and HiSilicon backdoors • PowerPC support: Binary analysis of firmware built for the PowerPC CPU architecture • Enhanced security: Support for two-factor authentication Highly scalable, automated and cloud-based, the Centrifuge Platform is a simple and reliable way for monitoring security across an entire system of deployed IoT devices without the need for agents or access to the network itself. Centrifuge has been proven to increase productivity for security teams while reducing the number of breaches on internet-connected devices. Read More: Canuc Signs MoU with M3SH Technologies for IoT Equipment Distribution About ReFirm Labs ReFirm Labs provides the industry's first IoT and firmware security solutions that proactively vet, validate and continuously monitor IoT devices from hidden threats. Its flagship product, Centrifuge Platform®, detects and reports potential zero-day vulnerabilities, hidden crypto keys, backdoor passwords and known vulnerabilities in IoT devices without needing access to source code. ReFirm Labs' technology has been proven to provide the insight and intelligence needed for users to proactively defend connected devices and maintain compliance and the integrity of supply chain security. Founded by a team of former NSA offensive cyber operators, ReFirm Labs is trusted by government agencies and Fortune 500 companies that operate in a wide variety of industries, including: telecommunications, cloud infrastructure and data centers, automotive, health care, utilities, and manufacturing.

Read More

Events