Blog Posts

NIST IoT
Blog Posts

NIST IoT Cybersecurity and Privacy Risk report- overview and remarks

The National Institute of Standards and Technology (NIST) has released the Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks report. NIST IoT report (find the full document here) aims to help federal agencies and other organizations manage the cybersecurity and privacy risks associated with individual IoT devices. This NIST IoT report identifies

Read More »
Blog Posts

ShieldIoT Secures Urban Smart Lighting Deployments

Smart Street Lighting growth is driven by the ability of connected (smart) street lights to address the shortcoming of traditional street lights. Smart (connected) lighting systems can substantially reduce energy consumption as it can be incorporated with various sensors such as natural light sensors occupancy sensors, and motion sensors. This is why, today, we are

Read More »
Blog Posts

Mitigating Security Risks: A Coresets-Based Approach

AI-based Coresets is a highly efficient set of algorithms that is highly relevant method for IoT network traffic anomaly detection. As we discussed in our previous blog post it is imperative to discover the first signs of anomalous activity, resulting from various types of malfunctions and/or misconfigurations, before any damage to business operations and key

Read More »
IoT Networks
Blog Posts

Cellular-Based IoT Networks: Market Trends and Security

Market Overview At first, there was the internet, then mobile devices came along, and then devices became “connected”, launching the IoT networks revolution. Gartner predicts that in 2019 we’ll witness 14.2 billion connected things in use, and that this number will nearly double in the next couple of years, totaling in 25 billion by 2021.

Read More »
Blog Posts

Cellular Based Direct Communication IoT challenges

Introduction As we’ve explored in our previous blog post,  security is essential for the rapid adoption of IoT. However, since IoT as whole, and its security in specific, are relatively new, they lack a clear and accepted definition. Some include the security of every connected device, be it a car or a piece of machinery

Read More »