Esper raises $30M Series B for its IoT DevOps platform

There may be billions of IoT devices in use today, but the tooling around building (and updating) the software for them still leaves a lot to be desired. Esper, which today announced that it has raised a $30 million Series B round, builds the tools to enable developers and engineers to deploy and manage fleets […] Continue reading Esper raises $30M Series B for its IoT DevOps platform

Scientists harvest Wi-Fi signals to power an LED

Scientists have been working for years to harvest the power of ambient radio waves to power small devices, and these days there is hardly a richer source of these signals than Wi-Fi networks. Researchers have demonstrated a new approach to harnessing t… Continue reading Scientists harvest Wi-Fi signals to power an LED

The zero trust security market continues to grow

The global zero trust security market is projected to surpass $66,741.3 million, increasing from $18,500.0 million in 2019, at a CAGR of 17.6% from 2020 to 2027 timeframe, according to Research Dive. COVID-19 impact on the zero trust security market Th… Continue reading The zero trust security market continues to grow

Commercial third party code creating security blind spots

Despite the fact that third party code in IoT projects has grown 17% in the past five years, only 56% of OEMs have formal policies for testing security, a VDC Research reveals. Meanwhile, when asked to rank the importance of security to current project… Continue reading Commercial third party code creating security blind spots

Top security threats for power plants and how to proactively avoid them

Power plants are one of the most vitally important components of modern civilization’s infrastructure. A disruption in energy production impacts all aspects of society from healthcare to national security. Eliminating a country’s ability to generate en… Continue reading Top security threats for power plants and how to proactively avoid them

Cloud compromise now the biggest cybersecurity issue for financial institutions

Infoblox unveils a research into how the COVID-19 shutdowns challenged the financial services industry’s core infrastructure. More than one year into the pandemic, banks, insurers, and other financial institutions report costly consequences to fa… Continue reading Cloud compromise now the biggest cybersecurity issue for financial institutions

NAME:WRECK DNS Bugs: What You Need to Know

For most internet users, there’s not much of a perceivable difference between the domain name they want to visit and the server that the domain queries. That’s because the Domain Name System (DNS) protocol does a good job of seamlessly routing users to… Continue reading NAME:WRECK DNS Bugs: What You Need to Know

Dispelling four myths about automating PKI certificate lifecycle management

The public key infrastructure (PKI) underpins the most effective strategy for securing communications between machines, network and mobile devices, virtual servers, and the IoT, whether inside or outside the firewall. As the volume of machines, devices… Continue reading Dispelling four myths about automating PKI certificate lifecycle management

How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

In the world of telecom, a greenfield service provider is one where the deployment and configuration of its network are entirely new – where none existed before. In the USA, DISH is getting a lot of attention for its greenfield deployment of the nation… Continue reading How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity