burgerlogo
article img

IT and Security

In the information technology space, IoT can be implemented into new and existing devices to track performance and alert staff in the case of unexpected behavior or incidents, saving companies the time it takes to recognize and damage-control a problem. Additionally, IoT can be used to automate processes to reduce the cost of highly manual and repetitive tasking and processes, improving ROI.

article
article img

IT and Security

In the information technology space, IoT can be implemented into new and existing devices to track performance and alert staff in the case of unexpected behavior or incidents, saving companies the time it takes to recognize and damage-control a problem. Additionally, IoT can be used to automate processes to reduce the cost of highly manual and repetitive tasking and processes, improving ROI.

article

Recent Articles

article

All IT and Security Articles

Cybersecurity

Machine Learning Just Made it Really Easy to Break into Your Phone

Machine learning programs can now guess a four-digit pin number with 100% accuracy by the fifth attempt based on the orientation of your phone.

Yitaek Hwang

Apr 17, 2017

article img

Cybersecurity

Machine Learning Just Made it Really Easy to Break into Your Phone

Yitaek Hwang

Apr 17, 2017

article img

Cybersecurity

Sopris: Microsoft’s Solution to IoT Security Problems

Sopris - Here are the 7 properties of highly secure devices and how Microsoft implemented all 7 in low-cost microcontrollers.

Yitaek Hwang

Apr 10, 2017

article img

Cybersecurity

Sopris: Microsoft’s Solution to IoT Security Problems

Yitaek Hwang

Apr 10, 2017

article img

Data Analytics

Digital Footprint - What Facebook Knows About Me

Protecting your digital footprint is important, so I used a Chrome extension called Data Selfie to find out what Facebook knows about me.

Yitaek Hwang

Mar 14, 2017

article img

Data Analytics

Digital Footprint - What Facebook Knows About Me

Yitaek Hwang

Mar 14, 2017

article img

Consumer Products

Huge Vulnerability Discovered in the Ring Doorbell

As we've seen with the Ring doorbell vulnerability, all stakeholders in an IoT company must make security their top priority.

James Schaefer

Mar 9, 2017

article img

Consumer Products

Huge Vulnerability Discovered in the Ring Doorbell

James Schaefer

Mar 9, 2017

article img

Cybersecurity

Smart City Security - Touchscreen Kiosks Get Hacked

An excellent report by Kaspersky Lab exposes several weak points in our smart city technology stack — including hilarious hacks of electronic road signs.

Yitaek Hwang

Feb 26, 2017

article img

Cybersecurity

Smart City Security - Touchscreen Kiosks Get Hacked

Yitaek Hwang

Feb 26, 2017

article img

Cybersecurity

CryptoNets: Neural Networks for Encrypted Data

What are CryptoNets? CryptoNet is Microsoft Research's neural network that is compatible with encrypted data.

Yitaek Hwang

Feb 10, 2017

article img

Cybersecurity

CryptoNets: Neural Networks for Encrypted Data

Yitaek Hwang

Feb 10, 2017

article img

Cybersecurity

You’re Being Sold on the Internet

No description found for this article. Please try again later

Yitaek Hwang

Feb 7, 2017

article img

Cybersecurity

You’re Being Sold on the Internet

Yitaek Hwang

Feb 7, 2017

article img

Cybersecurity

Security in IoT - How to Address IoT Security Issues

Security in IoT is absolutely critical, but faces a myriad of issues. Here are some possible solutions for consumers, businesses, and governments alike.

Calum McClelland

Feb 2, 2017

article img

Cybersecurity

Security in IoT - How to Address IoT Security Issues

Calum McClelland

Feb 2, 2017

article img

Cybersecurity

Smart City Privacy - Potential Challenges as Our Cities Become More Connected

Smart cities will have higher standards of living, increased safety, etc.. But will we trade privacy for these benefits? Let's look at smart city privacy.

Calum McClelland

Nov 26, 2016

article img

Cybersecurity

Smart City Privacy - Potential Challenges as Our Cities Become More Connected

Calum McClelland

Nov 26, 2016

article img

Cybersecurity

Every Vote Counts, but not Every Vote is Counted.

No description found for this article. Please try again later

Calum McClelland

Nov 5, 2016

article img

Cybersecurity

Every Vote Counts, but not Every Vote is Counted.

Calum McClelland

Nov 5, 2016

article img
logo

The Most Comprehensive IoT Newsletter for Enterprises

Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.

Looking to Advertise on IoT For All?

Check out our Partner Program to drive maximum value for your brand across our channels!

article

Recent Resources

How IoT Soil Condition Monitoring is...

January 1st, 2020

article img

How IoT Soil Condition Monitoring is...

January 1st, 2020

article img

How IoT Soil Condition Monitoring is...

January 1st, 2020

article img