Skip to content
  • HOME
  • INDUSTRIES
  • SOLUTIONS
    • GATEWAY SECURITY
    • SECURITY MANAGER
    • NETWORK SECURITY
  • TECHNOLOGY
  • EVENTS
  • BLOG
  • COMPANY
    • MEET THE TEAM
    • PARTNERS
    • PRESS RELEASES
    • CAREERS
  • CONTACT US
Menu
  • HOME
  • INDUSTRIES
  • SOLUTIONS
    • GATEWAY SECURITY
    • SECURITY MANAGER
    • NETWORK SECURITY
  • TECHNOLOGY
  • EVENTS
  • BLOG
  • COMPANY
    • MEET THE TEAM
    • PARTNERS
    • PRESS RELEASES
    • CAREERS
  • CONTACT US

CYBERSECURITY BLOG

Keep up-to-date with the latest information about cybersecurity

Blog Posts

Coreset Technology: Unravelling The “Magic”

Much of ShieldIOT’s “secret sauce” and key differentiators are based on its unique Coreset technology. In this blog we’ll try to provide additional insights to what are coresets and why can they act as a game changer in protecting mass scale IoT networks. Current Challenge Today there are many good and available (off-the-shelf) artificial intelligence /

Read More »
October 4, 2020
NIST IoT
Blog Posts

NIST IoT Cybersecurity and Privacy Risk Report: Overview and Remarks

The National Institute of Standards and Technology (NIST) has released the Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks Report. NIST IoT report (find the full document here) aims to help federal agencies and other organizations manage the cybersecurity and privacy risks associated with individual IoT devices. This NIST IoT report identifies

Read More »
July 10, 2019
Blog Posts

ShieldIoT Secures Urban Smart Lighting Deployments

Smart Street Lighting growth is driven by the ability of connected (smart) street lights to address the shortcoming of traditional street lights. Smart (connected) lighting systems can substantially reduce energy consumption as it can be incorporated with various sensors such as natural light sensors occupancy sensors, and motion sensors. This is why, today, we are

Read More »
June 30, 2019
Blog Posts

Mitigating Security Risks: A Coresets-Based Approach

AI-based Coresets is a highly efficient set of algorithms that is highly relevant method for IoT network traffic anomaly detection. As we discussed in our previous blog post it is imperative to discover the first signs of anomalous activity, resulting from various types of malfunctions and/or misconfigurations, before any damage to business operations and key

Read More »
May 4, 2019
IoT Networks
Blog Posts

5G and Cellular-Based IoT Networks: Market Trends and Security

Market Overview At first, there was the internet, then mobile devices came along, and then devices became “connected”, launching the IoT networks revolution. Gartner predicts that in 2019 we’ll witness 14.2 billion connected things in use, and that this number will nearly double in the next couple of years, totaling in 25 billion by 2021.

Read More »
May 4, 2019
Blog Posts

5G and Cellular Based Direct Communication IoT challenges

Introduction As we’ve explored in our previous blog post,  security is essential for the rapid adoption of IoT. However, since IoT as whole, and its security in specific, are relatively new, they lack a clear and accepted definition. Some include the security of every connected device, be it a car or a piece of machinery

Read More »
May 3, 2019

ABOUT ShieldIOT

ShieldIOT delivers innovative cybersecurity solutions that enable service providers and utilities to protect any IoT device, application or network. ShieldIOT is a single scalable platform  and does not require any network changes, development resources or unique security expertise.

Our AI-powered software security platform, combines patented AI network anomaly detection and device-based security mechanisms with centralized security management, to secure and manage the security of large complex IoT networks.

ShieldIOT_Positive_White
Securing the Internet of Things
Twitter
Linkedin-in

CONTACT US

For more information about ShieldIOT solutions, send us an email and a ShieldIOT expert will contact you.

Scroll back to top