WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Companies > audius
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
IoT Now | February 03, 2020
New research has been released that exposes the significant threat posed by shadow Internet of Things (IoT) devices on enterprise networks. The report from Infoblox Inc., a provider of secure cloud-managed network services, is titled What’s Lurking in the Shadows 2020.The research study surveyed 2,650 IT professionals across the US, UK, Germany, Spain, the Netherlands and UAE to understand the state of shadow IoT in modern enterprises. Shadow IT devices are defined as IoT devices or sensor...
Sdxcentral | February 20, 2020
Microsoft today made available Microsoft Threat Protection — nearly 18 months after first announcing the threat-hunting service — and its Azure Sentinel connector for IoT. The products use artificial intelligence (AI) to streamline threat hunting and improve security across customers’ clouds, data centers, endpoints, and IoT devices.The company first announced Microsoft Threat Protection in September 2018. It’s continued to add capabilities almost monthly, but it hasn&rsq...
IoT Business News | April 02, 2020
The Sensoriis device is an advanced IoT solution designed to monitor, collect, and analyze building status information. Sensoriis combines the LTE-M connectivity provided by Sequans along with Zigbee, which acts as an LTE-...
Securityboulevard | February 10, 2020
Cybersecurity for embedded systems and the Internet of Things (IoT) is taking a step forward, as the Trusted Computing Group (TCG) today announced its latest guidelines and best practices for software and firmware updates for embedded systems. Firmware and software updates are of increasing importance. Attackers constantly target the firmware and software in embedded systems, such as appliances and connected door locks, searching for vulnerabilities to exploit in order to establis...
IoT Security
Article
Software and Tools, Security
Whitepaper
Devices, Industrial IoT
Video
Industrial IoT, Theory and Strategy
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE