Sharon Shea Executive Editor - TechTarget - SearchSecurity SearchSecurity 6 different types of hackers, from black hat to red hat 21 Oct 2019 SearchSecurity To secure DevOps, break culture and tooling barriers 07 Oct 2019 SearchSecurity The 3 pillars of a DevSecOps model 07 Oct 2019 SearchSecurity How to conduct proper AWS vulnerability scanning in 3 steps 19 Aug 2019 IoT Agenda machine-to-machine (M2M) 02 Aug 2019 IoT Agenda Smart streetlights build smart city network backbone 19 Jul 2019 IoT Agenda An in-depth look at IoT and AI 20 Jun 2019 IoT Agenda An IoT security maturity model for IT/OT convergence 20 Jun 2019 IoT Agenda IoT battery outlook: Types of batteries for IoT devices 31 May 2019 IoT Agenda Mitigate IoT security risks with a strong defense strategy 30 May 2019 IoT Agenda Hospitality IoT checks in to Royal Park Hotel 23 May 2019 IoT Agenda Use cases and benefits of smart sensors for IoT 30 Apr 2019 IoT Agenda Seven use cases of IoT for sustainability 22 Apr 2019 IoT Agenda Time to get prepared for IoT security issues 22 Mar 2019 IoT Agenda IoT in business: Deploy a successful connected enterprise 26 Feb 2019 SearchCloudComputing clickwrap agreement (clickthrough agreement) 10 Jan 2019 IoT Agenda Editor's picks: Thought-provoking IoT blogs from 2018 02 Jan 2019 IoT Agenda microcomputer 31 Dec 2018 IoT Agenda RFID tagging 31 Dec 2018 IoT Agenda Use analytics in IoT projects to mine a hot commodity 26 Nov 2018 IoT Agenda IoT data analytics holds the key to putting data to use 26 Nov 2018 IoT Agenda What the union of IoT and edge computing means for IT pros 01 Nov 2018 IoT Agenda IoT edge computing: What's the practical potential? 01 Nov 2018 IoT Agenda How best to address connectivity for IoT issues 19 Oct 2018 IoT Agenda Z-Wave 29 Aug 2018 IoT Agenda Johnson Controls Smart Ready Panel equates smart stadiums to smart cities 09 Aug 2018 IoT Agenda What's next for industrial IoT applications, standards? 07 Aug 2018 IoT Agenda Overwhelmed by IIoT data? Perhaps hire a data scientist 07 Aug 2018 IoT Agenda At LiveWorx 2018, PTC CEO touts importance of IoT partnerships 22 Jun 2018 IoT Agenda The great IoT data ownership debate 23 Apr 2018 IoT Agenda IIC addresses industrial IoT security on endpoints 12 Mar 2018 IoT Agenda Particle Mesh brings mesh networking to IoT 13 Feb 2018 IoT Agenda Simplifying the IoT user experience and interface ... or lack thereof 08 Jan 2018 IoT Agenda Video analytics tools impact the bottom line 08 Jan 2018 IoT Agenda IoT security trends: The conversation is about to get real 08 Jan 2018 IoT Agenda 2018: The year AI and IoT converged 08 Jan 2018 IoT Agenda 'Co-everything' brings the rise of the IoT partner ecosystem 08 Jan 2018 IoT Agenda IoT edge analytics brings real-time intelligence to devices 08 Jan 2018 IoT Agenda LPWAN (low-power wide area network) 26 Sep 2017 IoT Agenda Domino's Pizza IoT deployment delivers temp monitoring, food safety 04 Apr 2017 IoT Agenda An inside look at beacon technology, manufacturers and use cases 12 Jan 2016 IoT Agenda IoT Agenda 23 Dec 2015 IoT Agenda Internet of Things security concerns prompt boost in IoT services 28 Aug 2015 SearchSecurity Government backdoor security concerns prompt letter to president 22 May 2015 SearchSecurity identity governance 25 Aug 2014 SearchSecurity OpenAppID 12 Aug 2014 SearchSecurity antispoofing 17 Jul 2014 SearchSecurity address space layout randomization (ASLR) 23 Jun 2014 SearchSecurity United States Secret Service (USSS) 02 Jun 2014 SearchSecurity TrueCrypt 02 Jun 2014 SearchSecurity cardholder data environment (CDE) 19 May 2014 SearchSecurity cardholder data (CD) 19 May 2014 SearchSecurity Verizon VERIS (Vocabulary for Event Recording and Incident Sharing) Framework 01 May 2014 SearchSecurity Verizon Data Breach Investigations Report (DBIR) 01 May 2014 SearchSecurity Heartbleed 15 Apr 2014 SearchSecurity Robert Morris worm 03 Apr 2014 SearchSecurity Microsoft Security Essentials (MSE) 02 Apr 2014 SearchSecurity Microsoft Enhanced Mitigation Experience Toolkit (EMET) 21 Mar 2014 SearchSecurity incident response plan (IRP) 20 Feb 2014 SearchSecurity BYOI (bring your own identity) 17 Feb 2014 SearchSecurity inline network device 14 Feb 2014 SearchSecurity SSL checker (secure socket layer checker) 03 Jan 2014 SearchSecurity madware 19 Dec 2013 SearchCloudComputing CloudTrust Protocol (CTP) 17 Dec 2013 SearchSecurity mandatory access control (MAC) 02 Dec 2013 SearchSecurity USGCB (United States Government Configuration Baseline) 22 Nov 2013 SearchSecurity CSR (Certificate Signing Request) 18 Nov 2013 SearchSecurity Security Bytes 30 Jan 2009 1 2