Machine to Machine - M2M Telemetry - Telstra Business

| March 1, 2016

article image
This video outlines a number of M2M applications across various industries. It demonstrates how M2M technology can be utilised in multiple settings to provide productivity benefits to businesses.

Spotlight

FormFactor Inc.

FormFactor, Inc. enables semiconductor manufacturers test the integrated circuits (ICs) that power consumer mobile devices...

OTHER ARTICLES

Hardware Threats to an IoT Ecosystem

Article | March 31, 2020

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Smart Building Initiatives are the Building Blocks of a Smart City

Article | April 8, 2020

To paraphrase a well-known saying, the journey to a complete smart city begins with a single building. No matter the size of the city, the extent of the technology or the most helpful use cases, a prospective smart city can integrate into — or branch off of — initiatives pushed forward by a smart building or campus. And when there is an increasing demand for these types of solutions, large corporations have the opportunity to improve corporate and social governance practices, as well as stand out in their community by championing more connected technologies.

Read More

Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Article | March 26, 2020

Modern cars have dozens of computers on board, and they’re not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering, brakes, and the engine itself. This is why automotive cyber security is essential. If a vehicle’s computer systems aren’t properly protected, hackers can steal data or even take control of the vehicle. As you can imagine, that makes automotive cyber security a major concern for consumers, auto companies, and OEMs alike. But what is there to know about automotive cyber security? We’ll explore what cybersecurity in the automotive industry entails and what the biggest threats are to automotive IoT and connected vehicles. We’ll also share some insights from a recent webinar by Sectigo and Mentor Graphics on how to protect connected vehicles from emerging cybersecurity threats.

Read More

Spotlight

FormFactor Inc.

FormFactor, Inc. enables semiconductor manufacturers test the integrated circuits (ICs) that power consumer mobile devices...

Events