WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Companies > Sena
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
A10 Networks | March 10, 2019
A10 Networks today announced the findings of a new report into the state of Distributed Denial of Service (DDoS) attack weapons and targets, showcasing the growing use of IoT devices in synchronised attacks on targets globally. The report describes the significant potential for attackers to use an IoT-related protocol, the Constrained Application Protocol (CoAP), deployed on IoT devices to marshal attacks....
Enterprise Iot
Nozomi Networks | January 25, 2024
Nozomi Networks Inc., the leader in OT and IoT security, today introduced Guardian Air™, the industry's only wireless spectrum sensor purpose-built for OT and IoT environments worldwide. With 80 percent of new IoT deployments wirelessly connected, wireless is quickly becoming a preferred network. The explosion of wirelessly connected devices increases potential access points and exploitation of networks. This puts critical infrastructure at risk of cyberattacks and disruptions to...
Industrial IoT
Tuya Smart | January 24, 2024
Tuya Smart, the global IoT developer service provider, has delivered its Best Practices in using Amazon Aurora at IoT industry. Amazon Aurora is a relational database management system (RDBMS) built for the cloud with full MySQL and PostgreSQL compatibility. Tuya and Amazon Web Services (AWS) built a solid basis of collaboration in database use cases exploration while also delivering smooth operation of billions of devices requiring high concurrency and low latency. Tuya...
Tech Radar | January 13, 2020
The risks of cybersecurity are more complex than ever. Due to the rise of the Internet of Things (IoT) and Artificial Intelligence (AI), by 2020 every person will generate 1.7 megabytes of information per second. As new technologies evolve, cyber criminals adapt and discover new hacking methods to apprehend sensitive data. AI and IoT have the potential to revolutionise society, but what happens when these new technologies are weaponized by cyber criminals? Unless hardware-based endpoint security...
Article
infographic
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE