Seekurity

Seekurity.com

We deliver detailed, comprehensive and customizable report at the end of each security engagement. Our reports typically include an executive summary, detailed technical findings with well defined proof of concepts, and recommended remediation steps.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

SOFTWARE AND TOOLS

LF EDGE RELEASES INDUSTRY-DEFINING EDGE COMPUTING WHITE PAPER TO ACCELERATE EDGE/ IOT DEPLOYMENTS

LF Edge | June 28, 2022

news image

LF Edge, an umbrella organization under the Linux Foundation that aims to establish an open, interoperable framework for edge computing independent of hardware, silicon, cloud, or operating system, today announced continued ecosystem collaboration via a new collaborative white paper, "Sharpening the Edge II: Diving Deeper into the LF Edge Taxonomy & Projects." A follow-up to the LF Edge community's original, collaborative 2020 paper – which provides an over...

Read More

HOW ARE TELECOMS USING THE INTERNET OF THINGS (IOT)

Sdxcentral | January 26, 2020

news image

Telecoms use the Internet of Things (IoT) to deliver a collection of products and services that bring additional value to their existing networks. In some cases, telecoms built separate networks specifically for their IoT platform. These IoT platforms that can be used as the foundation for developers and businesses to create their own IoT products and services. There are two protocol technologies telecoms use to connect IoT devices to their networks, LTE-M and narrowband IoT (NB-IoT). The protoc...

Read More

SECURITY

KASPERSKY ANNOUNCES SMART HOME SECURITY, A NEW PRODUCT TO PROTECT CONNECTED DEVICES AT HOME

Kaspersky | September 08, 2021

news image

Today, Kaspersky announces the release of Kaspersky Smart Home Security, a new offering that will help telecom operators respond to growing consumer demand for the protection of smart home devices. It provides comprehensive protection against a wide range of possible threats including device breakdowns, malicious attacks, covert surveillance and more. The product is installed on a router by a telecom operator, and users only need to download an application on a smartphone to control and monitor ...

Read More

SEVEN IN 10 COMPANIES KNOW OF HACKS AGAINST THEIR IOT DEVICES, RESEARCH FINDS

IoT Tech News | February 21, 2020

news image

The IoT is barreling towards the enterprise – but companies remain highly vulnerable to IoT-based attacks, according to a new report.The study from Extreme Networks, which polled 540 IT professionals across industries in the North America, Europe and Asia Pacific regions, found that 70% of companies who said they employed IoT devices were fully aware of successful or attempted hacks. 84% of those polled said they employed IoT devices of some subscription, with more than half admitting they...

Read More
news image

SOFTWARE AND TOOLS

LF EDGE RELEASES INDUSTRY-DEFINING EDGE COMPUTING WHITE PAPER TO ACCELERATE EDGE/ IOT DEPLOYMENTS

LF Edge | June 28, 2022

LF Edge, an umbrella organization under the Linux Foundation that aims to establish an open, interoperable framework for edge computing independent of hardware, silicon, cloud, or operating system, today announced continued ecosystem collaboration via a new collaborative white paper, "Sharpening the Edge II: Diving Deeper into the LF Edge Taxonomy & Projects." A follow-up to the LF Edge community's original, collaborative 2020 paper – which provides an over...

Read More
news image

HOW ARE TELECOMS USING THE INTERNET OF THINGS (IOT)

Sdxcentral | January 26, 2020

Telecoms use the Internet of Things (IoT) to deliver a collection of products and services that bring additional value to their existing networks. In some cases, telecoms built separate networks specifically for their IoT platform. These IoT platforms that can be used as the foundation for developers and businesses to create their own IoT products and services. There are two protocol technologies telecoms use to connect IoT devices to their networks, LTE-M and narrowband IoT (NB-IoT). The protoc...

Read More
news image

SECURITY

KASPERSKY ANNOUNCES SMART HOME SECURITY, A NEW PRODUCT TO PROTECT CONNECTED DEVICES AT HOME

Kaspersky | September 08, 2021

Today, Kaspersky announces the release of Kaspersky Smart Home Security, a new offering that will help telecom operators respond to growing consumer demand for the protection of smart home devices. It provides comprehensive protection against a wide range of possible threats including device breakdowns, malicious attacks, covert surveillance and more. The product is installed on a router by a telecom operator, and users only need to download an application on a smartphone to control and monitor ...

Read More
news image

SEVEN IN 10 COMPANIES KNOW OF HACKS AGAINST THEIR IOT DEVICES, RESEARCH FINDS

IoT Tech News | February 21, 2020

The IoT is barreling towards the enterprise – but companies remain highly vulnerable to IoT-based attacks, according to a new report.The study from Extreme Networks, which polled 540 IT professionals across industries in the North America, Europe and Asia Pacific regions, found that 70% of companies who said they employed IoT devices were fully aware of successful or attempted hacks. 84% of those polled said they employed IoT devices of some subscription, with more than half admitting they...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us