Internet of Things (IoT)
Edge and fog computing: Key to safer streets? (Part 3)
3 min read
In parts one and two, we used Michael Crichton’s 1973 sci-fi movie, Westworld, to illustrate the concepts of edge and fog computing and how they may be the...
Telecom operators: Are you ready for 5G?
2 min read
5G networking will create many opportunities for service providers in enhanced mobile broadband and fixed wireless access, but also in growth areas like IoT, NaaS, and virtual reality.
A Security Fabric for the Internet of Things
4 min read
There is a significant discrepancy between the presumed and actual number of #IoT devices connected to enterprise networks... #security
Introducing Global Problem Solvers: The Series
3 min read
We’re pleased to introduce Global Problem Solvers: The Series (GPS: The Series), a new Cisco corporate social responsibility (CSR) educational initiative.
What’s all the buzz about integrated, threat-driven CDM?
3 min read
The rollout of the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) Program has been a game changer for government agencies like yours. And whether you realize it...
Helping Enterprises Scale IoT Deployments with Secure Computing at the Edge
4 min read
The new Cisco Industrial Compute Gateway IC3000 offers built-in security and manageability at scale, enabling faster decision making at the edge by processing and normalizing data from various sensors.
Edge and fog computing: The key to smarter cities? (Part 2)
3 min read
In part one, we used Michael Crichton’s 1973 sci-fi movie, Westworld, to illustrate the concepts of edge and fog (or edge fog) computing. Now we’ll explore how government can...
Vulnerability Spotlight: Multiple Remote Vulnerabilities In Insteon Hub PubNub
1 min read
Cisco Talos is disclosing twelve new vulnerabilities in Insteon Hub, ranging from remote code execution, to denial of service. The majority of the vulnerabilities have their root cause in the...
Do you Trust your IoT Device and its Vendor?
2 min read
Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture?
2