We have teamed with GE Digital to provide security for all GE devices that are and will be connected to the Predix machine.Read More >
We currently have numerous Japanese customers who are key players in the IoT OEM market, from device manufactures to component builders. Security is a component that many Japanese clients seek; not only to protect confidential data in devices but also to enhance system capabilities and integrity.Read More >
We, Mocana, went around IoT World for 80…no, for 2 days, and had a grand old time. It was a packed house and a packed booth. There is currently so much buzz and energy around the IoT space, it is almost palpable. We had the benefit of having our booth right at the center of the floor, close to the main IoT World stages. This helped with foot traffic in general, and also made it easier for our partners and clients to find us. We had many vendors stop by who heard about us directly through our customers who told them they use our solution and came out of curiosity just to see what we were all about. We must have looked extra approachable, as we got this one very intelligent man who wrote a textbook (did not know textbooks still existed!) for industrial electronics. He wanted to add an IoT section to bring the book up to date for classes and wanted to collaborate with us to write that. I should have suggested to use this blog as a main resource; after all, it is written by the most brilliant minds in IoT security. Click here for our Industrial IoT whitepaper.Read More >
Mocana is taking on IoT! After our press release with Avaya on April 18, 2016, the Avaya team posted a blog about how their partnership with Mocana is enabling them to increase security assurances for the internet of things. Our FIPS certified cryptographic engine has been key to aiding clients expand their reach to government organizations.Read More >
Team Mocana seized the day and some swag (as one of our engineers put it) a week and a half ago at the Samsung Developer Conference in San Francisco’s Moscone Center. I walked into the office on Monday morning and saw one of our engineers decked out in a Samsung sweater, holding a Samsung bag, using a Samsung umbrella, and covering himself in a Samsung blanket, that I thought it worthy enough to dedicate an entire blog post to.Read More >
Malware is everywhere this week, as displayed from our featured articles. From mobile banking apps, to Bible and Quran apps, no application, regardless of its type, is exempt from malware or hacks.
Hackers are blending old and new methods to find innovative ways to steal personal information from you. Are you protected from these efforts?Read More >
The proliferation of connected devices and ghost security means continued flawed security for mobile.
It is projected that 50 million smart devices are going to be sold over the holiday season alone!
Where are these smart devices going to be bought? Why, from smartphones, of course!Read More >
App and tech security breaches have run amuck this week. Hackers are tapping into more and more diversified outlets in order to steal users' information. One in particular, was using an APK installation under the guise of a Microsoft Word document.
Before installing anything on your phone (even if it's on an app), be wary of its origin.Read More >