2017 Public Key Infrastructure (PKI) and Internet of Things (IoT) Security Predictions

| May 19, 2017

article image
Much has changed in the cybersecurity world throughout 2016. Many very public security incidents have taken place and numerous newly-developed attack methods have been developed. Although the threat landscape continues to become more dangerous, a number of security technologies, both new and longstanding, are available to address the needs of businesses. Public Key Infrastructure (PKI) has become a primary viable solution.

Spotlight

Hermes Engineering

Hermès Engineering is an independently owned IT consultancy company created in 1993. We help leading organizations achieve their business objectives through the innovative use of IT. We are proud to be a medium-sized company, around 65 collaborators, which makes our approach more “human” and based on services. Indeed, our motto is “A human way ofmanaging services”.

OTHER ARTICLES

What Makes Digital Transformation a Success?

Article | February 18, 2020

Despite more than $5 trillion having been spent on digital transformation efforts, survey after survey shows that successful digital transformations are far and few in-between. By many estimates, more than 50% of digital transformation efforts failed in recent years. While a recent survey conducted by Hanover Research and commissioned by AHEAD, the State of Enterprise Digital Transformation, found that 93% of enterprises are undergoing some digital transformation as they seek to cut costs (77%) and improve customer experience (71%). The survey found 42% of enterprises struggling to reach success as their efforts fall behind or stall.

Read More

Edge computing-driven transformation of data, management, and applications

Article | April 6, 2020

Big name companies are investing in edge computing developments. Bruce Davie, VMware’s VP and CTO, Asia Pacific and Japan, ranked Edge Computing along with the rise of mobile devices, cloud and AI in his list of “four super powers of technology”. According to Fujitsu CTO, Joseph Reger, “It is very obvious that you need to bring intelligence closer to [IoT] devices, and for that you must have a kind of distributed intelligence and that is going to reload the opportunities for digital transformation.” With reference to Gartner saying that by 2022, some 75% the of enterprise-generated data would be created and processed outside the traditional, centralised data centre or cloud, Hewlett Packard Enterprise (HPE) committed some US$4 billion investment in intelligent edge technologies and services by 2021.

Read More

The world is ready for 5G. Are you?

Article | June 3, 2021

At last, the wait for 5G is nearly over. As this map shows, coverage is widespread across much of the U.S., in 24 EU countries, and in pockets around the globe. The new wireless standard is worth the wait. Compared to 4G, the new wireless standard can move more data from the edge, with less latency. And connect many more users and devices—an important development given that the IDC estimates 152,000 new Internet of Things (IoT) devices per minute by 2025. Put it together, and 5G is a game-changing backhaul for public networks. (Wi-Fi 6, often mentioned in the same breath as 5G, is generally used for private WANs.

Read More

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | May 3, 2021

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Spotlight

Hermes Engineering

Hermès Engineering is an independently owned IT consultancy company created in 1993. We help leading organizations achieve their business objectives through the innovative use of IT. We are proud to be a medium-sized company, around 65 collaborators, which makes our approach more “human” and based on services. Indeed, our motto is “A human way ofmanaging services”.

Events