WELCOME TO The THE INTERNET OF THINGS REPORT
Newsletter | Member Login | Signup
Home > Resources > Whitepapers > M2M and the Supply Chain
March 1, 2016
I'm For Real
Enter your details once to access all our information and resources
Logic Supply is a global industrial PC company specializing in small form factor, fanless computers specifically engineered for challenging environments.
whitePaper | July 22, 2022
Norgren is part of global engineering organization IMI plc. IMI is at the forefront of delivering the solutions we need in a changing world and is focused on creating tremendous value by solving key industry problems in attractive markets and employing the best.
whitePaper | September 5, 2022
Today’s well-designed, secure and compliant internet of things (IoT) products and services possess extraordinary capabilities. But even knowing the tremendous amount of potential that exists, it can be overwhelming for IT and business leaders to develop an IoT strategy.
whitePaper | September 13, 2022
Secure, seamless remote network access is a business enabler — boosting remote user productivity and reducing the time spent by IT teams to onboard and maintain user-to-application connectivity with agility and resilience. And yet, remote access remains a challenge for many organizations
whitePaper | December 5, 2022
IoT applications are extremely vulnerable to cybersecurity attacks as they control both data access (often personal or sensitive) and connected devices. Without proper security, IoT technology will not grow as projected nor live up to its true potential in the marketplace. This paper focuses on how to create secure IoT device and sensor identities, fostering data access and interaction across devices in a trusted ecosystem.
whitePaper | August 16, 2022
During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior
whitePaper | June 17, 2022
The implementation of fifth generation mobile communication systems in society has been in full swing since around 2020. Mobile communication systems have evolved into a communication infrastructure (1G-3G) and a living infrastructure (4G), becoming an indispensable element in the lives of individuals. It has become a social infrastructure that connects not only people but also things like the Internet of Things (IoT).
Conference
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE