Learn more about ZARIOT, IoT security, signalling security, and more
Overview of our security, coverage, and our philosophy
A brief introduction to what ZARIOT can do for your project
How can a Zero Trust philosophy be successfully applied to IoT?
Basics of Signalling Security
The basics of signalling, attacks over cellular, and how cellular can be secured
A quick overview of what ZARIOT is, our security, coverage, what we can do for your IoT project, and what we mean when we say your devices will be Connected. Protected.
Sep 21, 2020
Why you need signalling security
Why do you need signalling security?
Even with IP Security, VPN & Encryption, devices are vulnerable to DoS, location tracking, and SMS and data interception over all cellular technology.
Aug 27, 2020
Business-Critical Devices and the Constraints of Regulation
In this presentation, we discuss the vulnerabilities of various network types, potential attack types and documented examples, current regulations (and lack thereof) and why regulators are so powerless to act. We examine what kind of devices may need guaranteed connectivity, what uptime means to business-critical devices, and examples of individual business-critical devices fleets. Finally we address what should be done at a regulatory level as well as at an enterprise level to secure critical IoT and M2M devices.
April 9, 2021
Optimising Cellular for IoT Connectivity
At this year’s IoT Tech Expo Virtual, Stuart Mitchell outlined the latest trends in cellular IoT and mobile security, advising what MNOs can do to improve security for IoT, and what security standards and practices should be considered before roll-out.
March 17 – 18, 2021
Applying Zero Trust to Cellular IoT
What is Zero Trust and how can it be applied to IoT? How can we use Zero Trust to identify the vulnerabilities in cellular IoT deployments? What techniques and strategies are needed to implement best in class cybersecurity principles? Stuart Mitchell clarifies all.
March 17 – 18, 2021
IoT Security in a Zero-Trust Environment
In episode 06 of IoT For All’s Let’s Connect! Podcast, Stuart Mitchell talks about IoT security, vulnerabilities in equipment and in mobile network infrastructure, and how the future of IoT deployment needs to look to Zero Trust environments.
March 12 2021
Cellular connectivity from 2G to 4G has been unsecured, and 5G is no magic bullet. Stuart Mitchell discusses the history of mobile networks, attack types, the challenges of 5G security, current protections, and how these fit into best practices for end-to-end IoT security.
Dec 11, 2020
Speaking at IoT Slam, Stuart Mitchell invites us to use the 6 Ws to ask: What techniques can be used to protect SIMs? What vulnerabilities are inherent on the mobile network infrastructure itself? How and when should the public Internet be used carry critical and sensitive data for analysis and storage? And more…
Aug 19, 2020