IoT Security

Turn Your Old Smartphone into a Secure Live IP Streaming Camera With CloudConnexa™
Do you have an old smartphone lying around? Don't recycle it or trade it in for a new one for a paltry sum! You can turn it into an Internet Protocol streaming security camera (IP camera) and view the live video stream from anywhere for free. You may get more value from repurposing your smartphone as a security camera than the trade-in value of your old phone. This blog post provides a step-by-step guide to upcycling your old phone.
May 2, 2023
Read More

Forget IT Security: Why OT Systems Could Be Your Biggest Cyber Risk
Operational Technology systems run the world. It’s time we address the expanded attack surface and security risks that come with them.
July 14, 2022
Read More

Cybersecurity for the Manufacturing Industry
The manufacturing industry's embrace of the Internet of Things (IoT) has changed our world in countless ways — not the least of which is that it resulted in Industry 4.0.
March 10, 2022
Read More

IDS/IPS: What They Are, and Why You Need Them
Intrusion Detection Systems and Intrusion Prevention Systems — or IDS/IPS — are invaluable, readily available network security tools for mitigating malicious traffic and suspicious activity. And the benefits of IDS/IPS aren’t limited to vulnerabilities associated with 5G. Read on for a look at how your business can make an Intrusion Detection System and Intrusion Prevention System part of your security management.
February 22, 2022
Read More

IoT Vulnerabilities for Cybersecurity
IoT devices such as cameras and virtual assistants don't just house sensitive data; they're a way for bad actors to actually look into your home.
January 6, 2022
Read More

Google's SLSA Looks Good, But Is It Enough?
ast month, Google introduced “Supply chain Levels for Software Artifacts” (SLSA), an end-to-end framework to ensure the integrity of software artifacts throughout the software supply chain. It's a powerful first step -- but is it enough?
July 15, 2021
Read More

IoT Risks Are Growing: Is Your Business Prepared?
The Internet of Things is ever-expanding, which means the risk to your business network is expanding, too. Here's what you can do about it.
May 20, 2021
Read More

Learning from the Colonial Pipeline Hack: 4 Ways to Mitigate the Risk of a Ransomware Attack
The cyberattack that knocked an essential U.S. gasoline pipeline offline shows how dangerous the professional-scale hack-for-ransom threat is, and it's spreading rapidly.
May 13, 2021
Read More

CNI Under Attack: What Can We Learn From the Florida Water Hack?
When the worst case scenario nearly played out in Oldsmar, Florida earlier this month, the cybersecurity community was perhaps less surprised than the public and mainstream media.
March 4, 2021
Read More

With Innovation Comes Risk: The Dark Side of IoT
It is reported that the world IoT population will outnumber the human population by as many as 80 billion connected devices, as early as 2025.
August 25, 2020
Read More