Other content in this Stream
An Introduction to Enterprise Architecture and Security in Digital Transformation
Learn about enterprise architecture and security in digital transformation
Multinational Manufacturing and Technology Conglomerate Implements SD Elements
Internet of Things: Security Vulnerabilities and Challenges
Learn about the modern-day IoT threat landscape.
Shifting the Paradigm for Connected Car Security
Learn about the security required for connected cars.
A Primer on Security in the Industrial IoT Space
Learn about the challenges related to Industrial IoT security.
An Introduction to California’s Upcoming IoT Regulations
Learn about California's new IoT regulations.
A Primer on Industrial Control Systems Cybersecurity
Learn about the security challenges related to Industrial Control Systems.
Why IoT Development is Heading to Agile
Research Directory Atlaz Valani weighs in on IoT development practices.
Publish-Subscribe Security in IoT Environments
Learn about securing Publish-Subscribe systems within the Internet of Things (IoT).
Publish-Subscribe Threat Modeling
The Publish-Subscribe messaging pattern is a solution to message dissemination and delivery challenges. Instead of directly transmitting a message to an end receiver (e.g. the way the traditional...
A Solution for Resource Service-Discovery Challenges within the Internet of Things By now, most of us are familiar with the concept of the Internet of Things (IoT). With the surge of systems and...
XMPP: Swiss Army Knife for Internet of Things (IoT)
Is XMPP the remedy for Internet of things? IoT communication is complex and varied, and XMPP, the Extensible Messaging and Presence Protocol, is a great candidate for an application-layer protocol....
NIST — From IT to IoT Security
NIST (National Institution of Standards and Technology) primarily publishes its computer/cyber/information security guidelines, recommendations and reference materials through Special Publication...
Implications of Internet of Things