Image
hero6-1_0000_gettyimages-598522761-hires

All Articles

DZone

Executive Insights on the State of IoT in 2018

See what nearly two dozen executives have to say about the state and current trends of IoT projects as the field continues to mature.
DZone

Introduction to Security and TLS

IoT security is always a top concern, so let's see how you can ensure your users are protected with this journey into secure architecture and TLS.
DZone

Pushing IoT Data Gathering, Analysis, and Response to the Edge

This article is featured in the new DZone Guide to IoT: Harnessing Device Data. Get your free copy for more insightful articles, industry statistics, and more!
Channel Life AU

Profiting from IoT: How to effectively monetise software

The Internet of Things (IoT) is changing how manufacturers approach software sales. Previously, embedded software was a given with all products. You pay for the product, you get the hardware – and the associated updates and upgrades. Now, however, manufacturers are moving from a one-off sales model to a recurring revenue one. Software monetisation is essential to this, but the change is easier said than done; many manufacturers face resistance from their customers when implementing these changes.
Channel Life NZ

Profiting from IoT: How to effectively monetise software

The Internet of Things (IoT) is changing how manufacturers approach software sales. Previously, embedded software was a given with all products. You pay for the product, you get the hardware – and the associated updates and upgrades. Now, however, manufacturers are moving from a one-off sales model to a recurring revenue one. Software monetisation is essential to this, but the change is easier said than done; many manufacturers face resistance from their customers when implementing these changes.
DZone

Enterprise and IIoT Edge Processing With Apache NiFi, MiNiFi, and Deep Learning

This article is featured in the new DZone Guide to IoT: Harnessing Device Data. Get your free copy for more insightful articles, industry statistics, and more!
The Washington Times

Nation-state sought to hack Pentagon with same vulnerability behind Equifax breach: NSA official

The software vulnerability used to breach Equifax last year was harnessed months earlier by a state-sponsored hacking group attempting to breach the U.S. Department of Defense, a senior National Security Agency official said Tuesday.
DZone

Introduction to IoT Sensors

This great introduction to prototyping boards and sensors will get you collecting data from Arduinos and Raspberry Pis in no time at all.
DZone

2018 Guide to IoT

Harnessing device data
Security Boulevard

10 Best Practices for Data Security in a GDPR World

Rapid technology advances have brought new challenges for the protection of personal data, so every organization needs a comprehensive approach to privacy management. They must also document how they collect, process and store personal data.
Digital Engineering

Embedded Software: The Heart of the IIoT

Every now and then, a technology rises to prominence that plays a fundamental role in a transformative event. Embedded software is one such technology.
IoT Agenda

Use software composition analysis to secure the industrial IoT

Earlier this year, botnets attacked networked security cameras, shining a light on the vulnerability concerns around industrial systems and the industrial IoT. As with any device connected to the internet, these types of devices have characteristics that make them a compelling target for botnet authors, as well as other types of malware.
IoT Now

IoT Global Awards 2018 winners named at Smart IoT London

The winners of the IoT Global Awards 2018 have been announced at the Smart IoT London event, held today at ExCeL. Judged across 12 categories, including CXO of the year, by a specially assembled panel of 12 Internet of Things (IoT) industry experts and insiders, the awards attracted 149 entries in their inaugural year. The awards are co-sponsored by IoT Global Network and CloserStill Media, organisers of Smart IoT London.
Tech Invest

7 Ways to Improve Security Compliance with Data Privacy Regulations

We’re living in a new era when it comes to the protection of personal data. Rapid technological developments, which have seen tremendous shifts, even in the past year alone, mean organisations now need to take a new outlook. This means they must take a comprehensive approach to all privacy.
Daily Herald

Flexera opens data center in Ireland

Flexera said has opened the doors to its new Data Platform Centre of Excellence offices in Belfast City Centre, Northern Ireland. The new Flax House facility will be focused on advancing Flexera's technology asset management solutions.
CSO

Are Spectre and Meltdown just hype?

Often, it’s the dramatic things that get our attention and what we see as a risk. We’re more scared of flying than of driving, and terrified of snakes and spiders when we’re more at risk from the common cold. So, do our fears lie in the right place?
Information Security Buzz

10 Ways to Improve Compliance with Data Privacy Regulations

Rapid technology advances have brought new challenges for the protection of personal data, and so every organisation needs a comprehensive approach to privacy management. They must also document how they collect, process and store personal data. But too many companies still fall down on the security fundamentals and new regulations such as the General Data Protection Regulation (GDPR), Payment Card Industry (PCI) Data Security Standard, Health Insurance Portability and Accountability Act (HIPAA) and ISO 27001 are making the cost of failure far greater than it’s ever been.
City Biz List

TA Associates Acquires Equity in Flexera

U.S. private equity firm TA Associates has closed its previously announced investment in Itasca, Illinois-based Flexera, a software supply chain company, according to a blog post on the latter’s site.
peHUB

TA Associates acquires equity in Flexera, will partner with Ontario Teachers’

U.S. private equity firm TA Associates has closed its previously announced investment in Itasca, Illinois-based Flexera, a software supply chain company, according to a blog post on the latter’s site. No financial terms were disclosed.
Info Security Products Guide

2018 Security Predictions and Directions

Vulnerable open source and third-party components will allow massive hacks