Much of ShieldIOT’s “secret sauce” and key differentiators are based on its unique Coreset technology. In this blog we’ll try to provide additional insights to what are coresets and why can they act as a game changer in protecting mass scale IoT networks. Current Challenge Today there are many good and available (off-the-shelf) artificial intelligence /
Keep up-to-date with the latest information about cybersecurity
The National Institute of Standards and Technology (NIST) has released the Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks Report. NIST IoT report (find the full document here) aims to help federal agencies and other organizations manage the cybersecurity and privacy risks associated with individual IoT devices. This NIST IoT report identifies
Smart Street Lighting growth is driven by the ability of connected (smart) street lights to address the shortcoming of traditional street lights. Smart (connected) lighting systems can substantially reduce energy consumption as it can be incorporated with various sensors such as natural light sensors occupancy sensors, and motion sensors. This is why, today, we are
AI-based Coresets is a highly efficient set of algorithms that is highly relevant method for IoT network traffic anomaly detection. As we discussed in our previous blog post it is imperative to discover the first signs of anomalous activity, resulting from various types of malfunctions and/or misconfigurations, before any damage to business operations and key
Market Overview At first, there was the internet, then mobile devices came along, and then devices became “connected”, launching the IoT networks revolution. Gartner predicts that in 2019 we’ll witness 14.2 billion connected things in use, and that this number will nearly double in the next couple of years, totaling in 25 billion by 2021.
Introduction As we’ve explored in our previous blog post, security is essential for the rapid adoption of IoT. However, since IoT as whole, and its security in specific, are relatively new, they lack a clear and accepted definition. Some include the security of every connected device, be it a car or a piece of machinery