WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Companies > Secure Technology Alliance
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
IoT Tech News | January 24, 2020
IoT solutions provider Skylo Technologies has raised $103m in its recently held series B funding round led by SoftBank Group. Prior to this, the California-based firm raised $13m in Series A funding. Now as Skylo has accumulated a total funding of $116m till date, the company will aim to bring instant, affordable, and global IoT connectivity to millions of machines, sensors, and devices, even in the most distant geographies. Skylo also claims to be the world’s first IoT firm to leverage th...
Enterprise Iot
Sierra Wireless | September 14, 2022
Sierra Wireless a world leading IoT solutions provider, today announced the AirLink RX55 LTE cellular router solution to bring advanced networking capabilities to the Industrial IoT (IIoT) and deliver intelligence securely at the edge for mission-critical applications on both public and private networks. Optimized for Industrial IoT and Industry 4.0 Adoption The new AirLink RX55 cellular router solution provides ultra-low power consumption, which combined with its wide oper...
IoT News | January 16, 2020
It is well established that IoT devices greatly increase the security challenges of defending corporate networks, and a recent PwC survey reported that 71% of manufacturers plan to deploy IoT devices, despite the associated risks. It seems like the IoT train has left the station and is rushing full steam ahead towards the horizon. In order to continue to travel safely, enterprises must understand the risks of deploying IoT devices and how to mitigate them. This assessment process should consider...
Embedded computing | January 14, 2020
OEMs often tout their “system approach” to design. In theory, this means that they look at the end application, and then design each aspect of the system to meet the needs of that application. Security is no different. The OEM must ensure that there are no holes in the security chain. However, the OEM typically stops at the outside of the box. If you plug in a rogue device, you’re generally on your own. Or if there’s a problem upstream, like with the cloud provider, it&rs...
Article
IoT Security
infographic
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE