Quantcast
Channel: Erik Heidt
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

IoT Target Architecture | Webinar Replay Info

First, I want to say thank you for everyone who participated in today’s webinar. Especially folks who responded to our polls, asked a question or left a comment behind. If you weren’t able to...

View Article



IoT Lab | Hello World

Every technology adventure begins with a “Hello World” moment, whether it is getting that first computer program to run, or the first LED to blink, we always start small and build from there. Many of...

View Article

Image may be NSFW.
Clik here to view.

IoT Security | Endpoint Hardware Key Storage

While cryptographic algorithms fail from time to time as computational tools advance or analytical breakthroughs occur, failures of this nature are rare events. Key storage or management failures are...

View Article

IoT Endpoint Security Standards Emerging

Do you need security standards that can be used to evaluate or design IoT Endpoints? Answers are coming! There is an often repeated story arc that security, risk, audit and industry standards proceed...

View Article

Image may be NSFW.
Clik here to view.

On Demand | Securing IoT An Architectural and Risk-Driven Approach

Thanks to everyone who participated the Webinar. “Securing the Internet of Things: An Architectural and Risk-Driven Approach” is now available on-demand, here is the link. Security is a top concern and...

View Article


IoT Lab | Maker Safety, Part 1

While there are more glamorous subjects than safety, “An ounce of prevention is worth a pound of cure”. The goal of this IoT Lab subseries on Safety is to provide tips that lead to a few ounces of...

View Article

Image may be NSFW.
Clik here to view.

IoT Lab | Maker Safety, Part 2

Part 1 focused on understanding that risk is different in the workplace than it is in the enthusiast or hobby world, and tried to explore resources for understanding and addressing that gap. Here in...

View Article

Image may be NSFW.
Clik here to view.

On-prem/Private IoT Platform Gotchas

During 2017 I had a number of conversations with clients about where the computational power for their IoT projects would be located. In my webinar “IoT Target Architecture: Your Strategy’s Linchpin” I...

View Article


IoT Security | NISTIR 8200 in Draft – Act NOW!

We knew this was coming, and this is a big day in IoT security and risk management. Let’s explore why it is important for your organization to take action now, and those options. (FYI: Here is a link...

View Article


2018 IoT Endpoint Security Assessment Services Survey

2018 has seen a significant uptick in Gartner clients asking for help identifying security services in support of their IoT efforts. At this time I don’t believe there is sufficient demand to make the...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images