IoT Target Architecture | Webinar Replay Info
First, I want to say thank you for everyone who participated in today’s webinar. Especially folks who responded to our polls, asked a question or left a comment behind. If you weren’t able to...
View ArticleIoT Lab | Hello World
Every technology adventure begins with a “Hello World” moment, whether it is getting that first computer program to run, or the first LED to blink, we always start small and build from there. Many of...
View ArticleIoT Security | Endpoint Hardware Key Storage
While cryptographic algorithms fail from time to time as computational tools advance or analytical breakthroughs occur, failures of this nature are rare events. Key storage or management failures are...
View ArticleIoT Endpoint Security Standards Emerging
Do you need security standards that can be used to evaluate or design IoT Endpoints? Answers are coming! There is an often repeated story arc that security, risk, audit and industry standards proceed...
View ArticleOn Demand | Securing IoT An Architectural and Risk-Driven Approach
Thanks to everyone who participated the Webinar. “Securing the Internet of Things: An Architectural and Risk-Driven Approach” is now available on-demand, here is the link. Security is a top concern and...
View ArticleIoT Lab | Maker Safety, Part 1
While there are more glamorous subjects than safety, “An ounce of prevention is worth a pound of cure”. The goal of this IoT Lab subseries on Safety is to provide tips that lead to a few ounces of...
View ArticleIoT Lab | Maker Safety, Part 2
Part 1 focused on understanding that risk is different in the workplace than it is in the enthusiast or hobby world, and tried to explore resources for understanding and addressing that gap. Here in...
View ArticleOn-prem/Private IoT Platform Gotchas
During 2017 I had a number of conversations with clients about where the computational power for their IoT projects would be located. In my webinar “IoT Target Architecture: Your Strategy’s Linchpin” I...
View ArticleIoT Security | NISTIR 8200 in Draft – Act NOW!
We knew this was coming, and this is a big day in IoT security and risk management. Let’s explore why it is important for your organization to take action now, and those options. (FYI: Here is a link...
View Article2018 IoT Endpoint Security Assessment Services Survey
2018 has seen a significant uptick in Gartner clients asking for help identifying security services in support of their IoT efforts. At this time I don’t believe there is sufficient demand to make the...
View Article
More Pages to Explore .....