THE SMART OBJECT AGE

March 1, 2016

Human beings no longer have a monopoly on memory, perception and the elaboration of knowledge. In fact, we now find classically human cognitive capabilities in many objects that fill our homes and offices, or are even worn around our necks or on our arms. We are not talking about science fiction here, but rather a very concrete vision of today’s product design scenario

Spotlight

Seekurity

We deliver detailed, comprehensive and customizable report at the end of each security engagement. Our reports typically include an executive summary, detailed technical findings with well defined proof of concepts, and recommended remediation steps.

OTHER WHITEPAPERS
news image

The Work Ahead in IoT: The Gap Widens Between IoT ‘Haves’ and ‘Have-nots

whitePaper | May 9, 2022

The current task with IoT is to drive performance outcomes by combining it with other advanced technologies and gaining buy-in from the employees essential to making digital initiatives possible.

Read More
news image

Cloud-native 5G –Getting Started

whitePaper | February 28, 2023

As they deploy 5G, telecoms operators around the world are experimenting with cloud¬native core networks, which offer greater flexibility, scalability and automation than conventional telecoms networks. This paper explores how telecoms operators could go about implementing a cloud¬native 5G core network. Most early movers are taking one of two approaches to deploy a cloud¬native 5G core:

Read More
news image

Securing Devices in Advanced Metering Infrastructures

whitePaper | January 8, 2020

Smart grid managers and Head End System (HES) vendors depend on data to drive their business. Receiving and analyzing accurate data from grid endpoints - the smart meters - is the main element that determines business success. Their customers, Distribution System Operators (DSOs) and Advanced Metering Infrastructures (AMI) managers, then use this data for crucial processes: monitoring energy demand and production, load shifting to maintain a persistent grid balance at all times and billing customers. Each tiny bit of data is the starting point for monetization and asset management and it must be accurate and trusted in order to keep power flowing.

Read More
news image

IoT white paper

whitePaper | January 22, 2022

This white paper has been prepared for distribution for informational purposes only. No regulatory authority has examined or approved any of the information set out in this white paper. The white paper may not be exhaustive and does not imply any elements of a contractual relationship or obligations.

Read More
news image

Connected Cars – Architecture,Challenges and Way Forward

whitePaper | January 2, 2020

The global automotive industry has been witnessing a transformation over the last decade with digital communication technologies making rapid inroads in vehicles. The world is moving towards the concept of connected transportation that focuses on providing enhanced connectivity like vehicles communicating with each other to know their presence, real-time communication facility to the occupants of the vehicle. This functionality is enabled by variety of technologies like vehicle to vehicle.

Read More
news image

CYBER SECURITY IN THE ERA OF INDUSTRIAL IOT

whitePaper | February 6, 2020

Industrial cyber security has been a topic of much debate over the last decade. Despite the industry’s widespread acknowledgement of its significance, cyber security in the industry continues to be an elusive subject for many. A huge gap exists in understanding the implications of cyber security; however, the subject has been greatly discussed. Interestingly, the industrial environment is currently passing through a key phase, where the idea of Internet of Things (IoT) is beginning to pervade all areas of industrial operation. This ongoing change is poised to expand the complex security needs in the factories of the future.

Read More

Spotlight

Seekurity

We deliver detailed, comprehensive and customizable report at the end of each security engagement. Our reports typically include an executive summary, detailed technical findings with well defined proof of concepts, and recommended remediation steps.

Events