smarthub

Physical Security

Implementing NIST 2.0 for the business ops folks out there – (1/5)

Article

If your enterprise lives in the kind of retro-analog-world in the picture, you have nothing to worry. For the rest of us, enterprise mortals, the edge in all its glorious innovations is helping us with new experiences, new models of service etc., etc., BUT, behind the scenes are operational and security folks working hard to […]

Implementing NIST 2.0 for the business ops folks out there – (1/5) Read More »

Navigating the Digital Experience (DEX) Revolution: The Path to Seamless Automation using AIoT

Blogs NeuralEdge

In today’s hyper-digital world, delivering exceptional user experiences is more critical than ever. We are at the crossroads of physical and digital realities, where everyday interactions are increasingly powered by digital tools. As the Internet of Things (IoT) and Artificial Intelligence (AI) rapidly converge, the right platform can be a game-changer for automation and transformation

Navigating the Digital Experience (DEX) Revolution: The Path to Seamless Automation using AIoT Read More »

Top Challenges in IoT Security: Insights from Forrester’s 2024 Report

Article Solution Defend

In today’s hyper-connected world, where emerging threats lurk around every corner, securing Edge and IoT devices has never been more critical. Increase in global adoption of Edge / IoT devices is contributing to the rising cybercrime rates, as they become prime targets for cyberattacks. According to the recent Forrester report, the spotlight is on the

Top Challenges in IoT Security: Insights from Forrester’s 2024 Report Read More »

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program

Article Solution Defend

A recent Gartner® study, “Implement a Continuous Threat Exposure Management (CTEM) Program” revealed that enterprises fail at reducing their exposure to threats through self-assessment of risks because of unrealistic, siloed and tool-centric approaches. They recommend that the security and risk management leaders must initiate and mature a continuous threat exposure management program to stay ahead

Make securing your edge an essential part of your Continuous Threat Exposure Management (CTEM) program Read More »

Why Embrace Edge Computing in India: A Crucial Imperative

Article Blogs

(Spoiler Alert: This may not answer all your questions, but may help you ask more questions) When Ray O’Farrell appeared before a Congressional committee in October 2017, little did he (or the legislators) imagine that our world would turn out the way it did, in just a few years. But he had made some interesting statements about

Why Embrace Edge Computing in India: A Crucial Imperative Read More »

Concerns at the PhySec Edge…

Article Solution Defend

The complexities in our environment have seen a quantum leap in recent years. Even something that we take for granted, in our everyday world, physical security, has seen a huge change in technologies that are deployed to keep us all safe. Learning from several professionals in the industry, from an edge infrastructure perspective, here’s what

Concerns at the PhySec Edge… Read More »

Got Edge ?

Article

This is not about all the edges in human existence, that’s another post coming soon, a prequel.  This one is about raising awareness to the fact we need awareness about all the devices in our lives – at the edge of our peripheral vision. If you have a role related to #security, #safety of assets (physical

Got Edge ? Read More »

Edge Technology Trends for Museums

Article News Solution Infer

In an era where technology is rapidly transforming every aspect of our lives, museums stand at a unique crossroads. These venerable institutions, traditionally seen as bastions of history and culture, have an unprecedented opportunity to harness cutting-edge technologies to enhance their mission. Here’s why embracing these technologies is not just beneficial, but essential for museums

Edge Technology Trends for Museums Read More »

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs)

Blogs Solution Energy

According to analysts, the global DER market is estimated to reach around $500m USD+ by 2028. This massive growth means there are more Edge endpoints that have to be monitored, managed  & secured across its lifecycle. More attack surface/endpoints = more cybersecurity risks for Utility companies. Sometime back, I had given a presentation to several delegates on Zero

Navigating the Complexities of Zero Trust architecture & computing, for Distributed Energy Resources (DERs) Read More »