COM-HPC stands for Computer-on-Module for High Performance Computing and is the next-generation standard for modular computing systems. As technology continues to advance, demands grow for…
Can Blockchain Combat Increasing Cyberattacks?
Blockchain has many applications beyond bitcoin. With the recent rise in cyberattacks, eyes have turned to blockchain as a possible cybersecurity solution. What is Blockchain?…
Achieving Comprehensive IoT Coverage with Nanosatellites
The Astrocast Nanosatellite IoT Network went live on January 25, 2021, making the Astrocast the first Swiss telecom satellite operator. The network provides customers with…
Securing IoT Part V: Artificial Intelligence
Artificial intelligence is a powerful data analytics tool that unfortunately aids cybercriminals as well as cybersecurity personnel. AI in Cyberattacks AI assists cybercriminals in planning…
Biden Signs Made in All of America Executive Order
On January 25, 2021, President Biden signed an executive order requiring the federal government to purchase more goods made in the United States. The order…
Securing IoT Part IV: Humans
Human error is the greatest security risk to IoT, often due to oversight or a lack of knowledge. The shift to remote working due to…
Endpoint Security Platforms: EPP and EDR
An endpoint is any computing device attached to an Internet-connected network, like computers, mobile devices, printers, routers or sensors. Over 70% of IT security breaches…
Securing IoT Part III: The Cloud
While cloud service providers are responsible for infrastructure security, it is the responsibility of individual companies to ensure data protection for stored information. McAfee outlines…
Securing IoT Part II: Security by Design for Devices
Security by design for IoT devices means envisioning security vulnerabilities at the concept stage of IoT device manufacturing. This allows for the strategic implementation of…