Enterprise Iot, Infrastructure

Threat detection and response in cloud environments

August 1, 2022

threat-detection-and-response
Cloud environments change fundamental assumptions in how to perform threat detection and response. The highly dynamic inventory of cloud workloads means systems come and go in seconds. When system configuration errors are introduced during a build, they can be exacerbated and amplified when automation replicates the errors across many workloads. Shared responsibility with the cloud service provider (CSP) creates potential threat detection gaps in the attack lifecycle.

Spotlight

NXP Semiconductors

NXP Semiconductor Austria site is located near Graz (Gratkorn). With over 400 highly qualified employees it is the competence center for leading-edge contactless systems within Business Unit Security & Connectivity and Business Unit Automotive. It is distinguished by its single-site integration of design, development, product management, marketing and application support activities. As a successful global player we offer appealing national & international career opportunities and special incentives such as flexible working time, additional vacation days, pension fund, etc. We are proud that our employees award us regularly as a “Great Place to work due to our outstanding work climate and team spirit.

OTHER WHITEPAPERS
news image

Fixed 5th Generation Advanced and Beyond

whitePaper | September 20, 2022

One of the overarching goals of the ETSI Industry Specification Group (ISG) F5G on Fifth Generation Fixed Network is to establish a regular rhythm of evolution for the fixed telecommunications network. This technology enhancement corresponds to the series of generations defined for the wireless network. So far, F5G has published technical specifications on use cases, generations definition of fibre networks, architecture, and more. As it continues, these documents will be enhanced and revised to describe the fifth generation of fixed networks more fully. Therefore, we need to consider the evolution of F5G. This White Paper describes the drivers, dimensions, and technologies of the F5G advanced and beyond.

Read More
news image

The Industrial IoT Landscape

whitePaper | December 30, 2019

Our mission is to design and demonstrate an Industrial Internet of Things (IIoT). We will develop the guidance needed to securely connect and profitably deploy intelligent systems across devices, edge, and cloud.

Read More
news image

Exploring the future of the network

whitePaper | January 6, 2023

The 5TONIC co-creation laboratory was launched in 2015 to provide an open environment where members from services, users and SMEs can collaborate with the telecom community on specific 5G mobile research and innovation projects. The aim is to support innovation and help organizations work together to develop and deliver market-ready 5G solutions, technology applications and business ventures. 5TONIC promotes joint project development, entrepreneurial ventures, discussion fora, events and conferences with focus on 5G mobile technology, supporting members along the technological cycle from research to practical business application.

Read More
news image

HOW TO ACHIEVE SUCCESS WITH THE IOT?

whitePaper | December 7, 2021

Achieving success with the Internet of Things (IoT)requires a lot more than just selecting the right technology. This helpful guide tackles the aspects of IoT implementation that companies wrestle with the most, such as creating a strong business case, managing security requirements, and identifying the top requirements of a successful system. We also take a deep dive into the most common challenges that early IoT adopters have encountered—from budget constraints to cultural resistance to change—with advice on how to overcome these challenges to obtain real and tangible benefits.

Read More
news image

Breaking the Silos in V&V: The IoT Way

whitePaper | May 1, 2022

For Years, testing methodologies have focused on individual elements (Silos) of an organized, connected system. Testing is getting performed in isolation for front-end, back-end and field devices. The result – even though an individual element may work well, the chain of connected system may still appear to be broken due to flaws in integration points.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More

Spotlight

NXP Semiconductors

NXP Semiconductor Austria site is located near Graz (Gratkorn). With over 400 highly qualified employees it is the competence center for leading-edge contactless systems within Business Unit Security & Connectivity and Business Unit Automotive. It is distinguished by its single-site integration of design, development, product management, marketing and application support activities. As a successful global player we offer appealing national & international career opportunities and special incentives such as flexible working time, additional vacation days, pension fund, etc. We are proud that our employees award us regularly as a “Great Place to work due to our outstanding work climate and team spirit.

Events