IoT Worlds

Security

Threat Hunting Reduces False Positives

Federico Pacifici
Threat hunters don’t have to accept that false positives are simply part of doing business; by employing cutting-edge intelligence and tools that offer context-aware analysis they can reduce them significantly. Imagine a world in which...

Cyber Threat Hunting Technique

Federico Pacifici
Threat hunting differs from traditional intrusion prevention technologies in that it detects hidden malicious activity and helps security teams defend against human-led attackers more effectively. It typically does this through taking a proactive approach by...

How to Start with the Networking As a Service

Federico Pacifici
Networking as a Service (NaaS) is an innovative model that provides network hardware and services subscription-based. This solution eliminates large upfront payments while offering greater pricing flexibility. What is Networking As a Service (NaaS)? Network...

Why the Purdue Model Is Still Useful

Federico Pacifici
“All models are wrong, but some are useful”, is an often repeated saying. Even though the Purdue model has been around for three decades and OT networks have moved beyond its hierarchical structure, it still...

What Is Threat Modeling?

Federico Pacifici
Every day, new threats emerge that threaten businesses. These threats could include information disclosure without authorization, malware infections, data breaches and more. Administrators use threat modeling to assess the risks their systems face and prioritize...

Using Public IP in IoT

Federico Pacifici
A public IP is a kind of Internet protocol address that is used to connect computers and devices to each other over a local network. It can be a dynamic or static one. The main...
WP Radio
WP Radio
OFFLINE LIVE