smarthub

Article

Zero Trust for Smart Cities

Article Blogs

A Security Model for today’s vulnerable landscape As cities are getting evolved into smart cities, cybersecurity threats and their various approaches are evolving at a greater pace. Addressing these challenges need the ZeroTrust security model. It offers a proactive approach that can significantly enhance the security posture of smart cities. What is Zero Trust? Zero […]

Zero Trust for Smart Cities Read More »

Top 5 things to consider for breaking down technological silos at the edge

Article Blogs Solution Infer

Silos hinder the seamless flow of information and pose significant challenges for efficient management and optimization of systems, particularly at the edge. By embracing few key approaches, organizations can effectively break down technology silos at the edge. This not only enhances operational efficiency and agility but also lays the groundwork for innovation and future growth

Top 5 things to consider for breaking down technological silos at the edge Read More »

Simplifying the Edge: Your route to unparalleled Stability and Control

Article Blogs Solution Defend

While the need to deliver superior customer (internal or external) service is driving enterprises towards rapid digital transformation, they are increasingly recognizing the challenges it brings along. One of the critical aspects is the management of Physical Security (which is trending into more converged technology security) in this era marked by heightened security threats and

Simplifying the Edge: Your route to unparalleled Stability and Control Read More »

Edge AI + Predictive Maintenance for Transformed Security Operations

Article Blogs NeuralEdge Solution Infer Solution Neural

Raj, the Sr. Director (Physical Security) for a global enterprise, managed surveillance systems, access controls, and alarms across hundreds of locations. While ensuring physical security was a critical priority, Raj faced mounting challenges maintaining the infrastructure itself. Equipment failures, unpatched firmware, and inconsistent configurations often resulted in downtime, security gaps, and increased vulnerability to cyberattacks. 

Edge AI + Predictive Maintenance for Transformed Security Operations Read More »

Operations Security – Lesson #1: Start with Visibility

Article Blogs Solution Defend Solution Infer

✴️ Edge Infrastructure that serves your customers, shortcut for attackers? 📖 Operations Security – Lesson #1: Start with Visibility In 2021, a major manufacturing company fell victim to a ransomware attack that disrupted global operations and cost over $70 million in losses. The root cause? An unpatched vulnerability in an edge device that was part

Operations Security – Lesson #1: Start with Visibility Read More »

Combating cyber risks in the era of IoT and smart offices

Article Blogs

While your IT team is busy making sure your computers have up-to-date antivirus software and security patches, many of your IoT vulnerabilities might be going unnoticed. In today’s hyper-digital world, it seems like everyone is depending on smart devices. Whether it’s a smartwatch with an exercise tracker, a smart coffee pot that responds to voice

Combating cyber risks in the era of IoT and smart offices Read More »

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies

Article Blogs Solution Defend

“Global cybercrime damage costs are expected to reach USD 10.5 trillion by 2025.” – Forbes The primary emerging priority for CISOs of late revolves around securing digital assets against cyber-attacks. As the number of devices and sensors continues to proliferate, alongside the rise of edge computing, the focus of safeguarding these assets—and the attention of

Enhancing Cyber Security of the Complex Edge: Challenges and Strategies Read More »

Security Systems: Insecure?

Article Solution Defend

An excellent timely post by Geoff Kohl in the SIA Newsletter.  Great advice for Physical Security practitioners.  Here’s a quick summary (with my comments bulletised): Imagine having to confess (in headline news) that a former employee was able to get into your surveillance system because, the passwords hadn’t been rotated!!!  Human Element as the Weak Link

Security Systems: Insecure? Read More »

Implementing NIST 2.0 (For the OT Implementors) Part 2/5 – “Identify”: CSF 2.0 for your Edge Landscape – Identify / Inventory

Article

Part 1 Recap: Expanding Risk Management for the Growing Edge In my last post, we discussed how NIST CSF 2.0 goes beyond cybersecurity risks to encompass a broader spectrum of threats to an organization, essentially defining and managing risks. These can be financial, supply chain, reputational, technological, or physical. This series aims to provide a

Implementing NIST 2.0 (For the OT Implementors) Part 2/5 – “Identify”: CSF 2.0 for your Edge Landscape – Identify / Inventory Read More »