Operator opportunities in the internet of things

March 1, 2016

Estimates from different market analysts vary in terms of predicted figures – but they all agree that data usage will at least double every year until 2015, when data will outweigh voice 30 times over. These predictions are based on the concept that anything that benefits from being connected will be connected.

Spotlight

RevBits Inc

RevBits develops cutting edge products including advanced endpoint security (Achilles Shield), Privileged Access Management combined with an extensive password and key management capability (ENPAST), a deception-based early breach detection system (BeeAlert), and phishing detection, prevention and awareness (Phish-O-Meter and PhishDrill). RevBits also provides full cyber security solutions and incident management for organizations of any size. Specialties include incident response, malware/forensic analysis, penetration testing, hardware/firmware/IoT device analysis, source code review, red teaming, social engineering/phishing, and mobile application assessment. RevBits is comprised of the industry’s leading talent for security incident detection, resolution, and monitoring.

OTHER WHITEPAPERS
news image

Security Impact of IoT on the Enterprise

whitePaper | November 28, 2019

We are moving to a time where many ‘things’ that we know and use have the capability to be connected to a network either wired or wirelessly. The way we use technology is becoming more integrated in all aspects of our daily lives and is steadily integrating within the enterprise environment. A core concern for businesses is therefore the risk of introducing Internet of Things (IoT) devices to the enterprise.

Read More
news image

The Disruptions of 5G on Data-driven Technologies and Applications

whitePaper | December 18, 2019

With 5G on the verge of being adopted as the next mobile network, there is a need to analyze its impact on the landscape of computing and data management. In this paper, we analyze the impact of 5G on both traditional and emerging technologies and project our view on future research challenges and opportunities. With a predicted increase of 10-100x in bandwidth and 5-10x decrease in latency, 5G is expected to be the main enabler for smart cities, smart IoT and efficient healthcare, where machine learning is conducted at the edge.

Read More
news image

AWS Prescriptive Guidance - Building an industrial Internet of Things (IIoT) digital transformation strategy

whitePaper | June 20, 2022

The industrial Internet of Things (IIoT) refers to the use of internet-connected sensors and devices in the industrial sectors, such as manufacturing, energy, automotive, healthcare, life sciences, and agriculture. IIoT allows telemetry data collection from equipment, machines, and field devices in an operational environment. These environments are commonly subject to industrial regulations; compute, networking, and power constraints; and inclement conditions, and all of these challenges contribute to the complexity of designing an IIoT solution.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Smart Intersections – IoT insights using Wi-Fi

whitePaper | November 28, 2019

Globally, more than 1.25 million people die in road traffic crashes every year and a further 50 million people are injured or disabled.¹ Meanwhile, congestion costs Australians $16.5 billion in 2015, according to the Bureau of Infrastructure, Transport and Regional Economics. The price of congestion is expected to double between $27.7 and $37.3 billion by 2030, without major policy changes.

Read More
news image

The Work Ahead in IoT: The Gap Widens Between IoT ‘Haves’ and ‘Have-nots’

whitePaper | September 1, 2021

The current task with IoT is to drive performance outcomes by combining it with other advanced technologies and gaining buy-in from the employees essential to making digital initiatives possible. While the definition of IoT evolves, the mission remains essentially the same: to provide real-time visibility into critical business operations.

Read More

Spotlight

RevBits Inc

RevBits develops cutting edge products including advanced endpoint security (Achilles Shield), Privileged Access Management combined with an extensive password and key management capability (ENPAST), a deception-based early breach detection system (BeeAlert), and phishing detection, prevention and awareness (Phish-O-Meter and PhishDrill). RevBits also provides full cyber security solutions and incident management for organizations of any size. Specialties include incident response, malware/forensic analysis, penetration testing, hardware/firmware/IoT device analysis, source code review, red teaming, social engineering/phishing, and mobile application assessment. RevBits is comprised of the industry’s leading talent for security incident detection, resolution, and monitoring.

Events