The Internet of Trusted Things

January 15, 2018

From wearables to wind turbines, the application of sensors on the ‘things’ around us has become ubiquitous. With a projected 10 billion more devices coming online in the next 4 years and some 44ZB of data flowing from them, such an internet of intercommunicating objects requires a secure and efficient way to track the identities, interactions, transactions, and activities of every “thing” in the network.1 Business and innovation leaders may be connecting their products, but most still struggle with service-based business models. The shift from material-based economies to information-based economies means value is now defined by how an entire ecosystem of constituents integrates, protects, and leverages product data contextually.

Spotlight

ANKR

ANKR makes things unlosable. Powered by our iOS and Android apps, attaching our simple device to most anything gives your everyday things a voice. Now, they can speak up before they’re forgotten.

OTHER WHITEPAPERS
news image

IoT white paper

whitePaper | January 22, 2022

This white paper has been prepared for distribution for informational purposes only. No regulatory authority has examined or approved any of the information set out in this white paper. The white paper may not be exhaustive and does not imply any elements of a contractual relationship or obligations.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | July 4, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More
news image

Connecting the Pneumatic Circuit Basics and benefits of connecting pneumatics to the Industrial Internet of Things

whitePaper | July 22, 2022

Norgren is part of global engineering organization IMI plc. IMI is at the forefront of delivering the solutions we need in a changing world and is focused on creating tremendous value by solving key industry problems in attractive markets and employing the best.

Read More
news image

NICT Beyond 5G/6G White Paper English version 2.0

whitePaper | June 17, 2022

The implementation of fifth generation mobile communication systems in society has been in full swing since around 2020. Mobile communication systems have evolved into a communication infrastructure (1G-3G) and a living infrastructure (4G), becoming an indispensable element in the lives of individuals. It has become a social infrastructure that connects not only people but also things like the Internet of Things (IoT).

Read More
news image

Creating secure IoT device identities

whitePaper | December 5, 2022

IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.

Read More

Spotlight

ANKR

ANKR makes things unlosable. Powered by our iOS and Android apps, attaching our simple device to most anything gives your everyday things a voice. Now, they can speak up before they’re forgotten.

Events