We are excited to share with you that we have released the Mocana IoT Security Platform, a new, version (GA0217) of our security software solution for embedded systems and the Internet of Things (IoT). This is a major update release that builds upon the cybersecurity technology that the company has developed over the past 15 years that secures embedded systems and IoT devices.Read More >
According to Accenture Consulting, 76 percent of manufacturers expect to launch Industrial Internet of Things (IIoT) applications and begin using smart devices by the end of 2017. While we have clearly reached an inflection point in terms of the acceptance of the IIoT, we’re still at the beginning stages of its growth and evolution. The questions that many are asking include: What will the future of the IIoT look like? What are some of the key drivers of the potential for a widescale digital transformation of industrial automation? How will we secure billions of IIoT devices and ensure safety of mission-critical infrastructure?Read More >
We have teamed with GE Digital to provide security for all GE devices that are and will be connected to the Predix machine.Read More >
We currently have numerous Japanese customers who are key players in the IoT OEM market, from device manufactures to component builders. Security is a component that many Japanese clients seek; not only to protect confidential data in devices but also to enhance system capabilities and integrity.Read More >
Malware is everywhere this week, as displayed from our featured articles. From mobile banking apps, to Bible and Quran apps, no application, regardless of its type, is exempt from malware or hacks.
Hackers are blending old and new methods to find innovative ways to steal personal information from you. Are you protected from these efforts?Read More >
The proliferation of connected devices and ghost security means continued flawed security for mobile.
It is projected that 50 million smart devices are going to be sold over the holiday season alone!
Where are these smart devices going to be bought? Why, from smartphones, of course!Read More >
App and tech security breaches have run amuck this week. Hackers are tapping into more and more diversified outlets in order to steal users' information. One in particular, was using an APK installation under the guise of a Microsoft Word document.
Before installing anything on your phone (even if it's on an app), be wary of its origin.Read More >