smarthub

Blogs

Explore our blogs for expert insights, industry trends, and actionable solutions designed to keep you ahead

Hackathon 2024 @SmartHub.ai – June 15, 2024

Hackathon 2024 @SmartHub.ai – June 15, 2024

Hackathons are exciting events that bring together individuals with diverse skills to collaborate, innovate, and create something amazing within a

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies

“Global cybercrime damage costs are expected to reach USD 10.5 trillion by 2025.” – Forbes The primary emerging priority for

Security Systems: Insecure?

Security Systems: Insecure?

An excellent timely post by Geoff Kohl in the SIA Newsletter.  Great advice for Physical Security practitioners.  Here’s a quick

Implementing NIST 2.0 (For the OT Implementors) Part 2/5 – “Identify”: CSF 2.0 for your Edge Landscape – Identify / Inventory

Implementing NIST 2.0 (For the OT Implementors) Part 2/5 – “Identify”: CSF 2.0 for your Edge Landscape – Identify / Inventory

Part 1 Recap: Expanding Risk Management for the Growing Edge In my last post, we discussed how NIST CSF 2.0

Implementing NIST 2.0 for the business ops folks out there – (1/5)

Implementing NIST 2.0 for the business ops folks out there – (1/5)

If your enterprise lives in the kind of retro-analog-world in the picture, you have nothing to worry. For the rest

Navigating the Digital Experience (DEX) Revolution: The Path to Seamless Automation using AIoT

Navigating the Digital Experience (DEX) Revolution: The Path to Seamless Automation using AIoT

In today’s hyper-digital world, delivering exceptional user experiences is more critical than ever. We are at the crossroads of physical

Top Challenges in IoT Security: Insights from Forrester’s 2024 Report

Top Challenges in IoT Security: Insights from Forrester’s 2024 Report

In today’s hyper-connected world, where emerging threats lurk around every corner, securing Edge and IoT devices has never been more

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program

A recent Gartner® study, “Implement a Continuous Threat Exposure Management (CTEM) Program” revealed that enterprises fail at reducing their exposure

Why Embrace Edge Computing in India: A Crucial Imperative

Why Embrace Edge Computing in India: A Crucial Imperative

(Spoiler Alert: This may not answer all your questions, but may help you ask more questions) When Ray O’Farrell appeared before a

1 2 3 4 5