Infrastructure, Industrial IoT

Zero Trust Maturity Model

June 13, 2023

zero-trust-maturity-model
The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Spotlight

eSilicon

Custom IC design isn’t simply about getting the highest performance anymore. It’s about hitting the target performance at the optimized power and area...

OTHER WHITEPAPERS
news image

Intelligent Edge & Private Networks Center of Excellence

whitePaper | December 19, 2022

The Accenture-Cisco Center of Excellence is an international center integrated with ACIC+ and its catalogue with a hub in Rome in the Accenture Cloud Innovation Center and one in Milan, in the Cisco Cybersecurity Co-Innovation Center as well as a Demo Center at Equinix’s datacenter ML5. The Center will leverage Market leader software-defined solutions for DC, WAN and LAN, Security for both corporate and industrial sites, to establish, based on Equinix Fabric and network edge catalog, a direct and low latency cloud interconnection through its resilient facilities to main cloud providers (MAG). The benefits of having Equinix in this architecture are numerous in terms of lower IT costs thanks to consumption-based billing, faster time-to-market and rapid innovation that supports large scale-up with fluid and real-time service enablement, plus monitoring from a single portal.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More
news image

Why VDI makes sense for hard-core UNIX® and Linux® engineering applications

whitePaper | July 19, 2022

By now, everyone has heard the terms desktop virtualization and VDI It seems like we’ve been pounded with marketing propaganda about these technologies from companies like VMware, Citrix® and Microsoft® since 2006. But if desktop virtualization is so good, why are most of the world’s desktops still “old-style” physical desktops and laptops?

Read More
news image

IoT at the Edge: HOW AI WILL TRANSFORM IOT ARCHITECTURE

whitePaper | May 23, 2021

The vast amounts of data constantly collected by the billions of sensors and devices that make up the Internet of Things (IoT) can pose a serious processing challenge for businesses that rely on traditional intelligence and analytics tools. An emerging solution is to use Artificial Intelligence (AI) and machine learning to build intelligent systems that automatically gather, process, and extract actionable insights from IoT data - in real time without the need for human intervention. How are AI-enabled systems transforming IoT devices and applications at the edge, and what are some of the emerging use cases we can expect to see in the near future?

Read More
news image

Best practices for cellular IoT development

whitePaper | March 28, 2022

This document introduces the main aspects and decisions you need to consider before and during your development phase of a low-power cellular Internet of Things (IoT) product. The sections are structured and ordered chronologically to follow a natural way of designing a cellular IoT device. The first sections cover the initial design decisions you might need to make to get the best possible baseline of your design. This includes overviews about the nRF9160 System in Package (SiP), modem radio, and radio technologies. The importance of network coverage and access is also discussed.

Read More
news image

INTERNET OF THINGS AND UEI DATA ACQUISITION & CONTROL SYSTEMS

whitePaper | February 5, 2020

The Internet of Things (IoT) is a networked system of interconnected physical objects that have the capability of sharing data with each other and also with a cloud service for archiving and analysis. With IoT, data producing devices can easily publish data, and multiple consumer clients can receive that data from any location in the world.

Read More

Spotlight

eSilicon

Custom IC design isn’t simply about getting the highest performance anymore. It’s about hitting the target performance at the optimized power and area...

Events