Rockwell Automation Collaborates With Cisco to Enhance Industrial Internet of Things Security
URL 2 Min
As the Industrial Internet of Things (IIoT) continues to deliver value from...
ICS Security Foundations – Cyber Security for ICS, Module 4: Security Controls
URL 20 Min
The fourth module dives deeper into ICS security controls. The differences...
IoT Edge Computing Presents Next Big Challenge for Cloud
URL 5 Min
IoT adoption continues to grow, but can public cloud keep up? Data gravity will...
Why IoT Security Is So Critical
URL 2 Min
Welcome to the era of the Internet of Things (IoT). The upside is that we are...
Machina Research Calls for Better Regulation to Prevent IoT-Enabled DDoS Attacks
URL 4 Min
Machina Research, has published a new Research Note discussing the role of the...
IoT and 5G Are Driving Computing to the Edge
URL 3 Min
By 2020, an average internet user will use 1.5GB of traffic a day, and daily...
Crowdfunding A Dev Kit For IoT
URL 3 Min
Another dev kit targeting developers and startups that want to build devices...
How to Optimize Networks for IoT
PDF 10 Min
With analyst firms forecasting exabytes of IoT-related network traffic by the...
Deconstructing IoT
MP4 3 Min
Various short videos show how to use Temboo for IoT Applications from the...
Why China’s New Cybersecurity Law is a Threat to International Businesses and Innovation
URL 3 Min
China has the world’s largest market for digital shopping, mobile payments, and...
IoT gateway architecture: Clustering ensures reliability
URL 4 Min
IoT gateways may be the unsung heroes of the Internet of Things world. Without...
Why Edge Computing Is an IIoT Requirement
URL 3 Min
To jump-start the productivity engine of IIoT, real-time response is needed at...
Internet of Things: Sensors & Sensing
URL 5 Min
Continuing my series of post on IoT/M2M and having been covered topics such as...
Tough and Tougher: IoT Security and Privacy
MP3 64 Min
The challenges facing IoT security are huge and in many cases, unchartered but...
AWS Launches Greengrass for IoT Edge Computing
URL 3 Min
AWS Greengrass, which was launched in limited preview late last year, is...
IoT APIs with David Janes
URL 8 Min
A deeper dive into why we are at a critical junction in the IoT's development,...
Simplifying Data Center Operation in the Age of IoT
URL 7 Min
The Internet of Things (IoT) is expected to be one of the biggest waves in the...
12 Steps to Stop the Next IoT Attack in its Tracks
URL 2 Min
The recent distributed denial-of-service (DDoS) IoT attack against DNS is a...
The IoT Architecture at the Edge
URL 10 Min
This article aims to focus on edge side of IoT Architectures where all things...
Why Machine Learning Will Decide Which IoT ‘Things’ Survive
URL 7 Min
No billion-dollar machine could replace a doctor. But a $25 machine can tell...
54.2105 points to government’s role in ensuring secure IoT adoption
URL 2 Min
The organization stresses government’s role in driving secure IoT adoption....
What is an IoT Application Platform?
2 Min
How do you define an abstraction that has become the focus of so many topics of...
Mist Computing – IoT on the Edge
MP4 10 Min
Until recently we could perform Internet of Things computations in four general...
IoT Security – The Security Development Lifecycle Way
MP3 61 Min
We all know, whether from experience or just intuitively, that bolting security...
Internet of Things Poses Opportunities for Cyber Crime
URL 2 Min
As more businesses and homeowners use web-connected devices to enhance company...
2014 IBM X-Force Threat Intelligence Report
PDF 10 Min
This quarterly report from the IBM X-Force research and development team...
ICS Security Foundations – Cyber Security for ICS, Module 1: Overview of Industrial Control Systems (ICS)
URL 15 Min
The first module of this e-learning course provides an overview of Cyber...
IoT Set to Push Computing to the Edge in 2018
The Internet of Things has steadily grown in importance over the last few years...
Firm Gets $9M to Secure the IoT
URL 2 Min
Bastille, an Atlanta-based startup that's billing itself as the first...
Machine Learning - The brain of Digital Transformation
URL 3 Min
We are all familiar with machine learning in our everyday lives. Both Amazon...
ICS Security Foundations – Cyber Security for ICS, Module 5: Myths and Worst Case Scenarios
URL 20 Min
The fifth and final content module teases apart the key myths that are...
ICS Security Foundations – Cyber Security for ICS, Module 3: Protocols and Standards
URL 20 Min
The third module delves into ICS protocols and standards. The difference...
M2M and the Internet of Things: A Guide
URL 5 Min
'Machine to Machine' (M2M) communication, is well under way — after all,...
Best Platforms for IoT Development
URL 3 Min
Two years ago we were surrounded by more than 15 billion connected devices; in...
Future-Proofing Your IoT Infrastructure
URL 3 Min
For all the value and disruptive potential that Internet of Things (IoT)...
The 5D Architecture – A Standard Architecture for IoT
URL 7 Min
Building a system to get value from the Internet of Things (IoT) or Industrial...
How The Internet of Things Is Already Changing Cloud Computing
URL 3 Min
The Internet of Things is slated to be one of the most disruptive technologies...
A Secure Model of IoT with Blockchain
URL 7 Min
The Internet of Things (IoT) is an ecosystem of ever-increasing complexity; it’...
From edge to cloud: A comprehensive look at IoT device security
URL 7 Min
The Internet of Things may have a significant economic potential, but it also...
Internet of Things Roundtable: IoT Platforms
URL 4 Min
Assembling an IoT network from commercial off-the-shelf components is still a...
Return to the Edge and The End of Cloud Computing
MP4 26 Min
"I'm going to take you out to the edge to show you what the future looks like...
32-bit ARMv8-A Core Targets IoT Space
URL 2 Min
ARM’s Cortex-A35 is a 64-bit core that is built around the ARMv8-A architecture...
Cisco WSA
MP4 5 Min
Cisco Web Security Appliance Promotional Video
SoC: Understanding the Threat & How IT Leaders Can Maintain Security
URL 3 Min
In the realm of IoT security vulnerabilities, there’s been a lot of talk about...
Hardware or Software Security: Which is Right for My IoT Device?
URL 7 Min
Most IoT devices are price-sensitive and deployed outside of a secure perimeter...
IoT Top 10 Security Project - OWASP
PDF 20 Min
The OWASP Internet of Things (IoT) Top 10 is a project designed to help...
Research: IoT use cases shifting to OT space
URL 3 Min
IoT project maturity is beginning to extend beyond IT-centric use cases to...
ICS Security Foundations – Cyber Security for ICS, Module 2: Threats to ICS
URL 20 Min
The second module  addresses threats to ICS. The difference between a...
The six best-paid IoT programming languages
URL 7 Min
One of the top factors slowing down IoT implementations is the talent gap:...
Some Good News About IoT Security
MP4 8 Min
What are the top issues in IoT security today? The very top issue is definitely...
The Four Cornerstones of Internet of Things Security
MP4 7 Min
It’s not possible to simply bolt on a firewall or Intrusion Detection System...
Why IoT Needs AI
URL 5 Min
At one of my recent talks in New York about AI in the supply chain, one of the...