Why data-driven technology is the key to ESG
It is critical that enterprises adopt environmental, social and governance (ESG) practices. Why data collection and analysis are key to this.Read More
View ArticleVentureBeat Q&A: Hailo CEO Orr Danon says edge AI means ‘stream the...
Hailo's dedicated deep learning edge AI processor is power-efficient, specifically designed for neural networks; vision is a major use case.Read More
View ArticleHow headless and composable are different and why it matters
Why enterprises must understand the ins and outs of headless and composable platforms to deliver expected digital experiences.Read More
View ArticleWhy the walled garden strategy needs to change
How we can trim back the hedges of walled gardens to empower consumers and redefine advertiser-publisher engagement with tech giants.Read More
View ArticleWhy attackers love to target IoT devices
Operations technology endpoints lack security. Four reasons IoT devices are such a high-value target for malware and ransomware attacks .Read More
View ArticleHoneywell’s acquisition of cybersecurity provider sets sights on...
Honeywell's acquisition of SCADAfence is a response to cybersecurity gaps resulting from unprotected IoT sensors and devices.Read More
View ArticleDell’s VC arm backs industrial edge software maker IOTech’s expansion to...
IOTech's software is designed to work for all types of use cases where physical capital can be monitored best by sensors at the edge.Read More
View ArticleHow AI can help close IoT’s growing security gaps to contain ransomware
Nation-state attackers are increasingly hitting unprotected IoT sensors essential to infrastructure and manufacturing.Read More
View ArticlePhosphorus gets $27M to build out its xIoT security solutions
Phosphorus stands out in the cybersecurity landscape with its unique capability to provide complete discovery, remediation, and security management across a vast spectrum of devices on the xIoT.Read More
View ArticleWhy attackers love to target misconfigured clouds and phones
Unencrypted identity data stored in unsecured or misconfigured clouds is an attackers' goldmine.Read More
View ArticleDefending against IoT ransomware attacks in a zero-trust world
Attacks on IoT and ICS networks are becoming so pervasive that it's common for the Cybersecurity and Infrastructure Security Agency (CISA) to issue cybersecurity advisories.Read More
View ArticleRace to the gen AI edge heats up as Dell invests in SiMa.ai
SiMa.ai's machine learning system-on-chip (MLSoC) technology, could integrate with Dell's edge computing offerings such as the PowerEdge XR series of ruggedized servers, enabling the company to deliver...
View ArticleKey takeaways from Forrester’s Top Trends in IoT Security 2024
Forrester identifies nine trends around IoT devices, which continue to be among the most vulnerable endpoints due to their very design.Read More
View ArticleWhy cellular-first SASE is defining the future of distributed enterprises
SASE consolidating network and security architectures is proving effective in streamlining ZTNA implementations.Read More
View Article