New & Notable
Evaluate
IoT data powers the metaverse
One of the promises of the metaverse is the ability to create simulations that can test outcomes and improve human life. IoT data feeds those digital twins.
Get Started
An introduction to IoT penetration testing
IoT systems are complex, and that makes checking for vulnerabilities a challenge. Penetration testing is one way to ensure your IoT architecture is safe from cyber attacks.
Manage
Factors to consider when securing industrial IoT networks
Industrial IoT networks differ from enterprise data networks. Keeping them safe requires a security strategy that's specifically crafted for legacy and new devices and sensors.
Problem Solve
How to overcome 4 common IIoT adoption challenges
More industries are employing IIoT to make their operations run smoother and more efficiently. But thorny deployment issues can give some companies pause.
Trending Topics
-
Enterprise IoT Evaluate
Get to know 12 IoT communication protocols
Not every IoT communication protocol is right for every deployment or device. Consider the power and security requirements before choosing one protocol over another.
-
IoT Platform Evaluate
Select the right IIoT monitoring tool
With the right monitoring software, organizations can automate and optimize their IIoT deployments. Tools from vendors such as Exosite, Kepware, AWS and Plex can help.
-
IoT Security Get Started
An introduction to IoT penetration testing
IoT systems are complex, and that makes checking for vulnerabilities a challenge. Penetration testing is one way to ensure your IoT architecture is safe from cyber attacks.
-
IoT Network Evaluate
Key considerations for setting up an IoMT network
Strong IoMT networks ensure that patient data can be safely and reliably sent to healthcare professionals, which can improve patient outcomes and decrease costs.
-
Industry and Verticals Evaluate
IoT data powers the metaverse
One of the promises of the metaverse is the ability to create simulations that can test outcomes and improve human life. IoT data feeds those digital twins.
-
Enterprise applications of AI Evaluate
6 generative AI predictions for 2024
Analyst Mike Leone predicts what's next for generative AI -- from open source to regulatory shifts -- offering a comprehensive view of where the industry is headed in 2024.
Internet of Things (IoT) Basics
-
Get Started
An introduction to IoT penetration testing
IoT systems are complex, and that makes checking for vulnerabilities a challenge. Penetration testing is one way to ensure your IoT architecture is safe from cyber attacks.
-
Get Started
How IoT helps support sustainable manufacturing
Implementing IoT can help manufacturers with sustainability goals stay on track through monitoring and automation. IoT can also help with compliance.
-
Get Started
decentralized application (DApp)
A decentralized application (DApp) is a type of distributed, open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
-
News
View All -
Enterprise internet of things
Cisco updates IoT management, go-to-market private 5G plans
Cisco has updated the IoT Control Center to support low-cost, low-bandwidth IoT. The company also released details for its private 5G go-to-market strategy.
-
Internet of Things security
Ripple20 vulnerabilities affect millions of IoT devices
Organizations that use IoT devices at risk from the Ripple20 vulnerabilities must secure them through patching, network segmentation and zero trust.
-
Internet of Things security
Nozomi Networks unveils free cybersecurity platform edition
The free edition is aimed at helping OT operators and IT security teams take the first step to finding the organization's assets that they need to secure within their OT and IoT networks.
IoT Agenda Definitions
- decentralized application (DApp)
- IoT devices (internet of things devices)
- IoT gateway
- IoT security (internet of things security)
- industrial internet of things (IIoT)
- virtual reality sickness (VR motion sickness)
- smart home
- internet of things privacy (IoT privacy)