burgerlogo
article

All Articles

Cloud Software

The Importance of IoT Platforms Through the Eyes of an MVNO

The purpose of this article is to analyze the importance of an IoT platform through the perspective of an MVNO. Firstly, we have assessed the different types of IoT platforms and their specific requirements. After that, we have looked at the major features of a comprehensive telecom services solution that can help MVNOs fulfill those IoT requirements.

Guest Writer

Mar 16, 2020

article img

Cloud Software

The Importance of IoT Platforms Through the Eyes of an MVNO

Guest Writer

Mar 16, 2020

article img

Consumer Products

5 Ways to Secure Your IoT Devices—Before They Get Hacked

A brief overview of ways to protect your IoT devices from hackers before you start using them. The article touches on two-factor authentication, the importance of routinely updating your devices, and why you should disable UPnP features—just to name a few.

Guest Writer

Mar 13, 2020

article img

Consumer Products

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Guest Writer

Mar 13, 2020

article img

Uncategorized

IoT Security and Common Criteria Framework

The Internet of Things (IoT) has entered the home. As cloud technology continues to expand its market reach, cloud-based applications are starting to make waves in the consumer market.

Guest Author

Mar 12, 2020

article img

Uncategorized

IoT Security and Common Criteria Framework

Guest Author

Mar 12, 2020

article img

Uncategorized

How Do We Enhance Trust in Connected Things?

Today, we have the Internet of Things, and we enjoy the hyper-connectivity it provides if only we can get ourselves to trust it. Our security technology is lagging behind, so how do we enhance trust in connected things?

Guest Author

Mar 12, 2020

article img

Uncategorized

How Do We Enhance Trust in Connected Things?

Guest Author

Mar 12, 2020

article img

Uncategorized

EU Cybersecurity Certification Framework and the Philosopher's Stone

The EU’s new Cybersecurity Act aims to improve EU cyber resilience and response by building upon existing instruments that keep networks and information systems secure.

Guest Author

Mar 12, 2020

article img

Uncategorized

EU Cybersecurity Certification Framework and the Philosopher's Stone

Guest Author

Mar 12, 2020

article img

Uncategorized

National Security Certifications for IT/IoT Products — DON'T GET LOST

In the EU there is currently a multitude of cybersecurity certification initiatives. However, the EU wants to set up an EU-wide certification framework through the Cybersecurity Act.

Guest Author

Mar 12, 2020

article img

Uncategorized

National Security Certifications for IT/IoT Products — DON'T GET LOST

Guest Author

Mar 12, 2020

article img

Uncategorized

Trusting Your Connected Gifts Blindly

Christmas is the time of giving, and it’s very likely some of you received new tech toys, including IoT devices. After all, they are frequently used on a day-to-day basis and have become an essential part of many people’s daily lives.

Guest Author

Mar 12, 2020

article img

Uncategorized

Trusting Your Connected Gifts Blindly

Guest Author

Mar 12, 2020

article img

Uncategorized

Towards a Happy & Secure New IoT Year

The year behind us has brought much cybersecurity-related news, and not all of it was good. With the multitude of high-profile breaches and reports of IoT devices used to carry out DDoS attacks and cybercriminals becoming more daring.

Guest Author

Mar 12, 2020

article img

Uncategorized

Towards a Happy & Secure New IoT Year

Guest Author

Mar 12, 2020

article img

Uncategorized

How Safe Are Smart Homes From Cyber Attacks

The biggest trend in the past year has been the rise of smart homes and devices. With everything from our light switches to our fridges connected to the internet, how safe are smart homes from cyber attacks?

Guest Author

Mar 12, 2020

article img

Uncategorized

How Safe Are Smart Homes From Cyber Attacks

Guest Author

Mar 12, 2020

article img

Uncategorized

Oversight and Management of Cybersecurity Risks for Board of Directors/Decision Makers

As IoT cybersecurity threats increase in both severity and frequency, every organization’s board of directors is expected to become more involved in the oversight and management of risks.

Guest Author

Mar 12, 2020

article img

Uncategorized

Oversight and Management of Cybersecurity Risks for Board of Directors/Decision Makers

Guest Author

Mar 12, 2020

article img

Uncategorized

Optimizing Investment to Minimize IOT Cyber Exposure

Cybersecurity solutions are continually evolving as well as cyberthreats that are almost inevitable. Therefore, the importance of optimizing investment in cybersecurity for organizations becomes more important than ever.

Guest Author

Mar 12, 2020

article img

Uncategorized

Optimizing Investment to Minimize IOT Cyber Exposure

Guest Author

Mar 12, 2020

article img

Internet of Things

Artificial Intelligence Applications: Is Your Business Implementing AI Smartly?

Each IoT business and service will have to create a strategy for components within the IoT offering to maximize success. AI is no different. Here are several AI applications in IoT.

Barry Haughian

Mar 12, 2020

article img

Internet of Things

Artificial Intelligence Applications: Is Your Business Implementing AI Smartly?

Barry Haughian

Mar 12, 2020

article img
logo

The Most Comprehensive IoT Newsletter for Enterprises

Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.

Looking to Advertise on IoT For All?

Check out our Partner Program to drive maximum value for your brand across our channels!