Learn more about ZARIOT, IoT security, signalling security, and more
Overview of our security, coverage, and our philosophy
A brief introduction to what ZARIOT can do for your project
How can a Zero Trust philosophy be successfully applied to IoT?
Basics of Signalling Security
The basics of signalling, attacks over cellular, and how cellular can be secured
A quick overview of what ZARIOT is, our security, coverage, what we can do for your IoT project, and what we mean when we say your devices will be Connected. Protected.
Sep 21, 2020
Why you need signalling security
Why do you need signalling security?
Even with IP Security, VPN & Encryption, devices are vulnerable to DoS, location tracking, and SMS and data interception over all cellular technology.
Aug 27, 2020
What are the primary concerns when it comes to securing an IoT deployment? This short collection of videos from our Security Series exposes some of the security risks for IoT deployments, and recommends how to tackle them through infrastructure, endpoint security and encryption techniques.
June 15, 2021
This compilation of videos from our Connectivity Series outlines all you need to know about cellular as a connectivity option for IoT, and how to secure it.
May 20, 2021
MWC 2021 HOTShot Interview
At MWC Barcelona 2021, ZARIOT CEO Dawood Ghalaieny spoke to Isabelle Paradis from Hot Telecom and shared his views of a future centred around the next generation of young, dynamic and bright people that can innovate to advance the industry. ZARIOT’s role in this future continues to focus on securing the IoT space and ensuring enterprises get exactly the IoT solutions they require.
June 30, 2021
How Bad is IoT Security Really?
What is the real story behind IoT security and how can enterprises tackle this growing challenge? To find out, watch this Hot Telecom HOTShot interview with Jimmy Jones, ZARIOT Head of Security. Jimmy emphasizes the need to design and include security from the start of an IoT deployment, and to understand the end-to-end solution. He highlights the importance of considering the whole IoT ecosystem and of securing connectivity.
June 24, 2021
Business-Critical Devices and the Constraints of Regulation
In this presentation, we discuss the vulnerabilities of various network types, potential attack types and documented examples, current regulations (and lack thereof) and why regulators are so powerless to act. We examine what kind of devices may need guaranteed connectivity, what uptime means to business-critical devices, and examples of individual business-critical devices fleets. Finally we address what should be done at a regulatory level as well as at an enterprise level to secure critical IoT and M2M devices.
April 9, 2021
Optimising Cellular for IoT Connectivity
At this year’s IoT Tech Expo Virtual, Stuart Mitchell outlined the latest trends in cellular IoT and mobile security, advising what MNOs can do to improve security for IoT, and what security standards and practices should be considered before roll-out.
March 17 – 18, 2021
Applying Zero Trust to Cellular IoT
What is Zero Trust and how can it be applied to IoT? How can we use Zero Trust to identify the vulnerabilities in cellular IoT deployments? What techniques and strategies are needed to implement best in class cybersecurity principles? Stuart Mitchell clarifies all.
March 17 – 18, 2021
IoT Security in a Zero-Trust Environment
In episode 06 of IoT For All’s Let’s Connect! Podcast, Stuart Mitchell talks about IoT security, vulnerabilities in equipment and in mobile network infrastructure, and how the future of IoT deployment needs to look to Zero Trust environments.
March 12 2021
Cellular connectivity from 2G to 4G has been unsecured, and 5G is no magic bullet. Stuart Mitchell discusses the history of mobile networks, attack types, the challenges of 5G security, current protections, and how these fit into best practices for end-to-end IoT security.
Dec 11, 2020
Speaking at IoT Slam, Stuart Mitchell invites us to use the 6 Ws to ask: What techniques can be used to protect SIMs? What vulnerabilities are inherent on the mobile network infrastructure itself? How and when should the public Internet be used carry critical and sensitive data for analysis and storage? And more…
Aug 19, 2020