Is the Most Important Room in Your Company Really Secure?

Someone Might Be Listening

Mergers and acquisitions. Updates to rolling three-year business plans. New product releases. Company restructures. SEC filings. These are the types of discussions that take place in corporate boardrooms across America. The information shared during these discussions can be of intense interest to competitors, stock manipulators, disgruntled insiders, and other malicious players who can use that information to do harm. With the list of threats […]

Deter and Delay Is No Longer Enough: How IPA Can Help Focus Response Resources and Improve School Safety

Recent events have pointed out the need for new and enhanced approaches to safety and security in schools. While the truth is that active shooter events are rare, the reality is that every school needs to prepare and take steps to minimize the possibility of and the damage that can result from such an event.

Deter, Delay, Respond

Basic security principles define three major functions of a security program: […]

IPA Security for Corrections: Inpixon at Mock Prison Riot 2018

With the ever-growing problem of mobile phones being used by inmates, all Department of Correction (DoC) facilities around the world are working hard to find a solution. Interdiction and manage access solutions can control phones from a cellular perspective, but Inpixon can easily […]

The Shape of Data Protection: Mobile Device Management Intersects the Security Dome

The explosion in wireless technology and applications, smart portable devices, and the Internet of Things (IoT) has made our lives easier, businesses more productive, and access to data and each other ubiquitous. But, that same explosion brought with it increased opportunities for hacks, malware, data leakage, skimming, shimming, and eavesdropping at levels never seen before, leaving enterprises looking for ways to protect themselves.

On the Road from BYOD […]

Smart Technology Connects Buildings. How Are You Managing It?

With the move to smart cities and buildings, is your company aware of all the technology that can connect to your network?

Companies are becoming more connected with Wi-Fi-enabled devices to enhance the workplace, reduce overhead, and enable communication worldwide. There are no longer only Wi-Fi access points and network extenders; now we have Wi-Fi-powered door locks, light switches, […]

By |2018-05-11T10:05:12+00:00May 9th, 2018|Categories: Big Data, IoT, Security|Tags: , , , , , |

Bluesnarfing: The Modern-Day Security Vulnerability in a Wireless and Mobile World

Once known as the next big thing in wireless communication since the invention of mobile phones, Bluetooth technology has since gained a reputation as one of the gaping barriers in mobile and wireless device security — almost as bad as public Wi-Fi access points.

This may seem like a bum rap for Bluetooth. The advanced technology makes it possible for the visually and motion-impaired […]

Why You May Need to Rethink Your IoT Security Plan

Traditional cybersecurity methods are still, to this day, playing catch-up. The warning signs were there years ago, and the IoT (Internet of Things) is following the same path. 4,000 IoT security attacks, or around 170 per hour, breach enterprises each day. 54% of those attacks are unsolved and typically stem from poor BYOD protocols. Despite that, we’re still unconvinced. So what’s the big deal with IoT security?

Enterprise companies […]

The Real Reason Your IoT Security Doesn’t Work

We’re being engulfed by the IoT swarm. What’s the real cost? Security professionals are fumbling, and it’s no surprise. Historically, we’re seeing undeniable parallels to cybersecurity’s very foundation.

In it’s beginnings, cybersecurity was straightforward: Security professionals would put up a perimeter firewall, IDS, access control lists, create a layered model, and set up a traditional architecture. Their approach to security was maximized, and they were content. But that’s no longer the case.

Back in 2006, Blackberry […]

To Stay in Business, You Need Physical Cybersecurity

Security cameras watching pedestrians: Cybersecurity

Physical cybersecurity: It’s the new hot-button topic making its way into security news feeds. So why are companies intent on ignoring the warning signs? Efforts to outsmart hackers need to adapt, and quickly.

We know cybersecurity is still under heavy containment. Why? Because security teams weren’t ready for its impact, now or in the past.

Travel back to 1988, when the Morris worm attached […]

Winners of the 2017 IoT Security Excellence Award Announced

Published July 6th 2017 on IoT Evolution.

TMC, a global, integrated media company helping clients build communities in print, in person and online, today announced the winners of the 2017 Security Excellence Award, presented by IoT Evolution Magazine.

The award honors the best, most innovative security  products and solutions released in the last twelve months as judged by the editors of TMC’s IoT Evolution World magazine.

“Congratulations to the recipients of the 2017 IoT Security Excellence […]