Internet of Things Security: Challenges and Solutions

Internet of Things Security: Challenges and Solutions

Considered the first Internet of Things (IoT) device, the toaster John Romkey created could be turned on and off over the Internet during the October ’89 INTEROP conference! Since then, more people have begun to use IoT devices. Simply put, IoT connects devices with the Internet, from things as simple as smart light bulbs and coffee makers to things as complicated as robots and drones.

5G: How It Works and What It Brings

5G: How It Works and What It Brings

Cars field more than 100 sesors. All these sensors turn our automobiles into mobile Internet of Things (IoT) devices. With on-board computers providing a vast number of functions, including mobile communication and entertainment systems, most cars today can also perform limited auto-piloting, communicate with nearby cars, and transmit sensor data over the internet. All of these activities are made possible because of increasing deployment of 5G.

Phish, Flags, and Lesson Plans: Upcoming Hackathon for Generation AI Nexus

Phish, Flags, and Lesson Plans: Upcoming Hackathon for Generation AI Nexus

Is artificial intelligence (AI) the way of the future… or already the way of the present?

Applications of AI surround us in our daily lives – ever use an app to get around traffic? How about checking your social media feeds? As our society integrates AI into our daily lives, it’s important to note that the upcoming generation has always lived with AI.

A New Resource Helps Thwart Hackers by Analyzing their Actions

A New Resource Helps Thwart Hackers by Analyzing their Actions

Author: Jennifer LarsonAnticipate. Analyze. Attack.That’s how you defeat cybercriminals. You anticipate the type of behavior they’re planning. You analyze their actions. Then, if necessary, you attack them. And fortunately for the people with the job of thwarting...
The Balancing Act of Usability and Security

The Balancing Act of Usability and Security

Collaboration systems are traditionally all about enabling users to share information. Usability is paramount: the easier it is for users to share within a tool, the more powerful and successful the tool is considered to be. Somewhat the opposite applies to security systems, as they are often considered most successful when parties are prevented from sharing something. Yet these two considerations, seemingly at odds with each other, are both essential to functioning systems in the real world.

Pin It on Pinterest