Blog Post
Top 10 IoT Security Vulnerabilities
Considering the ubiquity of the Internet of Things, IoT security has taken on increased importance in our connected, data-driven world. In this informative blog post, our security expert lays out the top 10 vulnerabilities IoT systems face so that you can remain as protected as possible.
Read More
Blog Post
Why Should You Use a Third-Party IoT Platform?
These days many companies are looking to IoT to enable their products. In the case of commoditized items, some see an opportunity to differentiate themselves and increase their margins; and with the help of some good marketing, may convince people that they need a smart kettle to get the water boiling 5 minutes before they…
View Article
Read More
Blog Post
Google I/O Rundown
Here’s a quick rundown from a tech perspective of what Google announced last week at its I/O conference: Google.ai Google bases most of its service model on artificial intelligence (AI). In this year’s I/O, they announced some really cool new data-center clusters called Tensor Processing Units (TPUs): huge, heavy-duty number-crunching machines that each provide up…
View Article
Read More
Blog Post
Security Best Practices: From IoT to HIPAA
A couple weeks ago, Kevin Gross posted about the myth of a hacker-proof IoT. His post gave a great high-level overview of ways to make the IoT as secure as possible, and it got me thinking about some more in-depth methods for attempting to attain the security we crave in the IoT industry, especially where…
View Article
Read More