As an award-winning, global cellular IoT connectivity provider, ZARIOT leverages our extensive experience to integrate both in-house and innovative partner features in the SIM. Transforming the SIM from a vital but underutilized asset, into a secure, intelligent, independent processor. Our … Read More
IoT security
![](https://www.zariot.com/wp-content/uploads/2024/06/password-protection.jpg)
Most high profile IoT breaches
The Internet of Things (IoT) has allowed our world to become more integrated and convenient than ever. However, as machine-to-machine and machine-to-human means of communication become more sophisticated, so do bad actors with malicious intentions. The following IoT breaches (and a … Read More
![](https://www.zariot.com/wp-content/uploads/2023/05/security.jpg)
All you need to know about ETSI EN 303 645
As we start to bring more smart devices into our lives, cybersecurity becomes a growing concern. For instance, Kaspersky honeypots revealed over 1.5 billion attacks against consumer IoT devices in the first half of 2019 alone. In order to minimize … Read More
![](https://www.zariot.com/wp-content/uploads/2024/02/this-is-an-historic-partnership-shot-of-two-busin-2023-11-27-05-21-56-utc.jpg)
ZARIOT & Crypto Quantique strengthen IoT device security & simplify management
As an award-winning, global cellular IoT connectivity provider, ZARIOT allows customers to utilize telecom network tools to build their own bespoke and secure IoT solutions. We transform the SIM from a necessary but underutilized asset, into a secure, intelligent, independent … Read More
![](https://www.zariot.com/wp-content/uploads/2023/06/5-Ways-to-Build-a-Culture-of-Security-in-Your-Organization.jpeg)
5 Ways to Build a Culture of Security in Your Organization
With a culture of security, organizations not only mitigate risks but improve compliance with regulations such as GDPR. Here are 5 practices to help build overall security maturity for your organization. … Read More
![](https://www.zariot.com/wp-content/uploads/2023/05/Taking-Identity-to-the-Edge-Devices.png)
Taking Identity to the Edge (Devices)
Did you know that the concept of having a unique identity can be applied to the IoT ecosystem and on an even more granular level, each and every IoT device? Learn more here. … Read More
![](https://www.zariot.com/wp-content/uploads/2023/05/Addressability-in-IoT-Deployments.jpeg)
Addressability in IoT Deployments
First time hearing about addressability for your IoT deployment? Don’t fret. We’re here to explore what it means and why it is becoming increasingly important in the IoT ecosystem. … Read More
![](https://www.zariot.com/wp-content/uploads/2023/04/GSMA-IoT-SAFE-–-Common-Standards-for-IoT-Security.jpeg)
GSMA IoT SAFE – Common Standards for IoT Security
IoT SAFE, a new GSMA standard launched in 2021 secures IoT application and data from ground, to cloud. Why does it matter and how can your IoT solutions stand to benefit from its features? Click on the link above to learn all about IoT SAFE and more. … Read More
![](https://www.zariot.com/wp-content/uploads/2023/03/LPWA-Networks-–-Choices-and-Implications-for-Your-IoT-Devices.png)
LPWA Networks – Choices and Implications for Your IoT Devices
Low-Power Wide-Area (LPWA) networks are power-efficient technologies designed to transfer small amounts of data. But how do you choose the right LPWA module for your IoT project? Read on to learn more. … Read More
![](https://www.zariot.com/wp-content/uploads/2023/03/Best-Practices-to-Safeguard-Your-IoT-Project.jpeg)
Best Practices to Safeguard Your IoT Project
With IoT implementation and deployment, challenges security can compound quickly, which drives up costs and delays progress. In this article, we outline some best security practices that you can consider when developing your current or future IoT project(s). … Read More