IoT Security Maturity Model: Description and Intended Us

February 25, 2019

The goal of a Security Maturity Model (SMM) is to provide a path for Internet of Things (IoT) providers to know where they need to be and how to invest in security mechanisms that meet their requirements without over-investing in unnecessary security mechanisms. It seeks to help organizations identify the appropriate approach for effective enhancement of these practices where needed. Deciding where to focus limited security resources is a challenge for most organizations given the complexity of a constantly changing security landscape.

Spotlight

Mentor Graphics

Mentor Graphics® is a technology leader in electronic design automation (EDA), providing software and hardware design solutions that enable companies to develop better electronic products faster and more cost-effectively. The company offers innovative products and solutions that help engineers overcome the design challenges they face in the increasingly complex worlds of board and chip design. Mentor Graphics has the broadest industry portfolio of best-in-class products and is the only EDA company with an embedded software solution.

OTHER WHITEPAPERS
news image

AI in Retail Marketing

whitePaper | August 18, 2021

Among retail marketers, a reliance on traditional business intelligence tools has left the intuitive decision-making in the hands of the marketing team. Download this guide to learn how to solve this AI dilemma.

Read More
news image

How Data Can Help Us Get Back to School Safely

whitePaper | August 18, 2020

This year, back to school for college students means more than just buying supplies, finding the right dorm and making sure to get into the proper classes. The COVID-19 pandemic has changed the annual fall ritual into one where campuses need to make sure they are safe from infection while providing a healthy environment for learning, growth and community.

Read More
news image

Applying Artificial Intelligence to Built Environments through Machine Learning

whitePaper | January 5, 2020

Machine learning (ML) is an application of artificial intelligence (AI) that allows systems to automatically learn and improve from exposure to more data without being explicitly programmed. ML focuses on the development of computer programs that can access data and use it to learn for themselves.1 While AI represents the broader concept of machines being able to carry out tasks in an intelligent way, machine learning is a current application of AI based on the idea that we can give machines access to data, and they can use that data to learn for themselves.

Read More
news image

Getting Started with Data Acquisition Systems

whitePaper | August 6, 2020

The purpose of any data acquisition system is to gather useful measurement data for characterization, monitoring, or control. The specific parameters of your application will dictate the resolution, accuracy, channel count, and speed requirements of a data acquisition system. A wide assortment of data acquisition components and solutions is available on the market, including low-cost USB modules, benchtop data loggers, and large channel systems. Before you start your search for a data acquisition solution, carefully analyze your application requirements to understand how much capability and performance you need to purchase.

Read More
news image

Artificial Intelligence & Financial Services

whitePaper | November 29, 2022

Artificial intelligence has long since graduated from science fiction and speculative use cases to widespread and diverse development across fintech sectors. CB Insights reported that financings for AI startups showed continued robust activity through Q2 2022, despite changes in market sentiment from the exuberance of 2021.

Read More
news image

TOP 5 REASONS TO PUT PRIVILEGE FIRST

whitePaper | July 20, 2020

Privileged access is the gateway to an organization’s most valuable assets and is at the core of nearly every major security breach. Organizations must have a strategy in place to manage and monitor privileged access, as well as detect and respond to threats if they’d like to mitigate risk from today’s advanced attacks. Your application stack and infrastructure is likely quite complex and it can be hard to identify which assets are the most sensitive. And there is a never-ending supply of vendors knocking down your door competing for your time and attention. These two realities make it increasingly difficult to identify which security project to tackle next. When thinking about how to prioritize, it is advantageous to take a step back and think about your businesses goals, albeit in a slightly different way: try to envision what you would be looking for if you were an external attacker or malicious insider looking to steal sensitive data, commit Ransomware, or use your infrastructure for illicit cryptomining.

Read More

Spotlight

Mentor Graphics

Mentor Graphics® is a technology leader in electronic design automation (EDA), providing software and hardware design solutions that enable companies to develop better electronic products faster and more cost-effectively. The company offers innovative products and solutions that help engineers overcome the design challenges they face in the increasingly complex worlds of board and chip design. Mentor Graphics has the broadest industry portfolio of best-in-class products and is the only EDA company with an embedded software solution.

Events