research
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
-1
archive,tag,tag-research,tag-225,stockholm-core-2.4.4,select-child-theme-ver-1.0.0,select-theme-ver-9.11,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.8,vc_responsive

5 steps to cybersecurity for Internet of Things medical devices

See on Scoop.it - Apps and Internet of Things Forrester Research offers insight into best practices to prevent criminals from wreaking havoc as IoT innovation outpaces medical device security. Apptimate's insight: Start asking device manufacturers for better security controls and don’t settle for excuses. Require that they: 1) Conduct

Clever Tool Shields Your Car From Hacks by Watching Its Internal Clocks

See on Scoop.it - Apps and Internet of Things A new prototype gadget uses the technique of fingerprinting computers based on their "clock skew" to detect vehicle hacking. Apptimate's insight: Interesting development in end-point security for automotive, but is of course applicable to other "devices" too. Still in

Apple winning the enterprise security race, Samsung makes push | ZDNet

See on Scoop.it - Mobility for enterprise According to a Tech Pro Research survey, Apple is viewed by tech decision-makers as the most secure mobile device option. Samsung is threatening Apple's lead, and Microsoft ranks well on tablets thanks to the Surface. Apptimate's insight: Apple has taken the

Enter at Your Own Risk: The Perils of Livestreaming Content

See on Scoop.it - Secure communication There’s no such thing as a free lunch, not even on the Internet. But if you do decide to splurge, new research finds your lack of willpower may come with a side order of malware. In this case, that free

Loading new posts...
No more posts