Heavyweight Security for Lightweight Devices

January 15, 2019

Billions of devices have already been deployed into the vast Internet of Things (IoT). Innovative engineers around the world have found ways to coax huge value from devices that have just a fraction of the computational and storage power of conventional computers or smartphones. In fact, it has been the ability to package powerful applications into miniature devices that has enabled the world-changing impact of the IoT.

Spotlight

Seekurity

Seekurity SAS de C.V. is a Cyber Security and Information Security consulting firm specialized in: 1- Penetration testing (Web, Mobile and Desktop Apps) 2- Physical Penetration Testing 3- Source Code Auditing 4- Content Management Systems Security Testing and Hardening 5- Vulnerability Assessments 6- Security Researches

OTHER WHITEPAPERS
news image

Dell VxRail System Tech Book

whitePaper | October 18, 2022

This document is a conceptual and architectural review of the Dell VxRail system, optimized for VMware vSAN. The Tech Book first describes how hyperconverged infrastructure drives digital transformation and then focuses on the VxRail system as a leading hyperconverged technology solution.

Read More
news image

Data Infrastructure and Analytics Software

whitePaper | September 28, 2022

Houlihan Lokey is a preeminent advisor in data infrastructure and analytics software, with deep knowledge in the field and extensive experience advising on M&A and capital-raising transactions.

Read More
news image

Threat detection and response in cloud environments

whitePaper | October 3, 2022

Cloud environments change fundamental assumptions in how to perform threat detection and response. The highly dynamic inventory of cloud workloads means systems come and go in seconds. When system configuration errors are introduced during a build, they can be exacerbated and amplified when automation replicates the errors across many workloads. Shared responsibility with the cloud service provider (CSP) creates potential threat detection gaps in the attack lifecycle.

Read More
news image

Open Radio Access Network Architecture on AWS

whitePaper | December 11, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

The Gorilla Guide to Converged Infrastructure

whitePaper | January 7, 2020

Discover the Power of Converged Infrastructure and learn how Converged and Hyperconverged Infrastructure Compare and Contrast. The more automated the delivery of the right storage to the right data, and the delivery of the right protection, preservation and privacy services to the right data, the more appropriate the infrastructure option is. This was supposedly what the storage vendors were working on when the SAN world was disrupted by the virtual server crowd. Converged Infrastructure is intent on returning us to that course. The purpose of this guide is to provide the IT planner or server administrator with background information that will assist them as they consider alternatives for hosting their mission-critical workloads and their data.

Read More
news image

Network Slicing for Beyond 5G Systems: An Overview of theSmart Port Use Case

whitePaper | May 10, 2021

: As the idea of a new wireless communication standard (5G) started to circulate around the world, there was much speculation regarding its performance, making it necessary to carry out further research by keeping in view the challenges presented by it. 5G is considered a multi-system support network due to its ability to provide benefits to vertical industries. Due to the wide range of devices and applications, it is essential to provide support for massively interconnected devices.

Read More

Spotlight

Seekurity

Seekurity SAS de C.V. is a Cyber Security and Information Security consulting firm specialized in: 1- Penetration testing (Web, Mobile and Desktop Apps) 2- Physical Penetration Testing 3- Source Code Auditing 4- Content Management Systems Security Testing and Hardening 5- Vulnerability Assessments 6- Security Researches

Events