IoT devices

See the following -

Data Breaches Through Wearables Put Target Squarely on IoT in 2017

Ryan Francis | Java World | January 3, 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts. Read More »

Five Tech Trends Affecting Healthcare IT Today, and Tomorrow

Technology is evolving faster than ever before, and shows no sign of slowing down. Digital innovation has enhanced the way we operate in almost every aspect of modern life, but in the healthcare industry, technology is not only changing lives, it's saving them too. Outlined below are five technology trends that are taking hold of the healthcare IT industry today, and what developments we can expect to see over the course of 2019 and beyond.

Read More »

Open Source Cloud and Middleware Company WSO2 Attracts $20 Million in Funding

Press Release | WSO2, Pacific Controls, Toba Capital | August 13, 2015

WSO2 today announced that it has closed a $20 million funding round led by Pacific Controls, a global provider of Internet of Things (IoT) and machine-to-machine (M2M) solutions, and joined by Toba Capital. The investment comes in the wake of increasing demand for WSO2’s comprehensive, open source middleware platform for building, integrating, managing, securing and analyzing companies’ APIs, applications, and Web services—on-premises, in the cloud, on mobile and IoT devices. 

Read More »

The Emergence of Artificial Intelligence And Why Open Source Matters

Sharing knowledge and sharing code has always been a key driver for innovation in Artificial Intelligence. Researchers have gathered together since AI was established as a field to develop and advance novel techniques, from Natural Language Processing to Artificial Neural Networks, from Machine Learning to Deep Learning. The Open Source community has played a key role in advancing AI and bringing it to solve real-world problems. Libraries and frameworks like TensorFlow, PyTorch, Keras, and Scikit-learn, for example, have allowed researchers and data scientists to study and make use of AI.

Read More »

Your Toaster May Be Bad For Your Health IT

the cyberattack last week...shut down access to many major websites...What does this have to do with health care?  Plenty, as it turns out.  IoT devices are increasingly helping us manage our health and medical care.  IoT in health care is expected to be a huge market -- perhaps 40% of the total IoT, and worth some $117b by 2020, according to McKinsey.  Expected major uses include wearables, monitors, and implanted medical devices. The problem is that many manufacturers haven't necessarily prepared for cyberattacks.  Kevin Fu, a professor at the University of Michigan's Archimedes Center for Medical Device Security, told CNBC: "the dirty little secret is that most manufacturers did not anticipate the cybersecurity risks when they were designing them [devices] a decade ago, so this is just scratching the surface."

Read More »

What are the Latest IoT threats to Network Security

Event Details
Type: 
Seminar/Webinar
Date: 
July 23, 2020 - 1:00pm - 2:00pm

Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Bob Baxley will examine recently disclosed vulnerabilities in protocols used by IoT devices which hackers can use to bypass your security, gain access to your systems, and exfiltrate data and voice information.

Read More »

Bastille Networks Zero Trust Cybersecurity Practices

Event Details
Type: 
Seminar/Webinar
Date: 
March 18, 2021 - 2:00pm - 3:00pm

Learn how to include Cellular, Bluetooth, BLE and IoT devices into your Zero Trust policy. Use Cases and Techniques for Enhancing your Zero Trust practices with examples featuring Bastille and automated Network Access Control (NAC ) systems. Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access.

Read More »