Exosite Blog

Announcements, updates, news, and more.

Getting Ahead of the Curve: Developing Proactive Responses to Security Threats

Getting Ahead of the Curve: Developing Proactive Responses to Security Threats

July 20, 2017 2 min read
IoT Security in Layers: Defense in Depth

IoT Security in Layers: Defense in Depth

July 11, 2017 2 min read
The 3 Core Technology Concepts of IoT Security You Need to Know

The 3 Core Technology Concepts of IoT Security You Need to Know

July 6, 2017 3 min read
Exosite Collaboration with ARM Provides Secure, Full-Stack IoT Solution

Exosite Collaboration with ARM Provides Secure, Full-Stack IoT Solution

June 28, 2017 3 min read
Not-so Doom & Gloom: Best Practices to Build a Pragmatic Security Strategy for IIoT

Not-so Doom & Gloom: Best Practices to Build a Pragmatic Security Strategy for IIoT

June 27, 2017 1 min read
Exosite Named a 2017 Top Workplace by the Star Tribune

Exosite Named a 2017 Top Workplace by the Star Tribune

June 26, 2017 2 min read
Exosite CTO Mark Benson to Present Keynote at the 2017 Sensors Expo and Conference

Exosite CTO Mark Benson to Present Keynote at the 2017 Sensors Expo and Conference

June 23, 2017 2 min read
Inside Exosite Podcast Kicks off with Scary Secure

Inside Exosite Podcast Kicks off with Scary Secure

June 21, 2017 1 min read
The Digital Twin and the Power of IoT

The Digital Twin and the Power of IoT

June 20, 2017 1 min read
Exosite CTO Mark Benson to Present at the 2017 IoT Slam® Internet of Things Conference

Exosite CTO Mark Benson to Present at the 2017 IoT Slam® Internet of Things Conference

June 16, 2017 2 min read
Asset Reporting Frequency: Sampling, Monitoring, and Real-Time

Asset Reporting Frequency: Sampling, Monitoring, and Real-Time

June 13, 2017 2 min read
The 3 Types of Digital Twin Maturity Models

The 3 Types of Digital Twin Maturity Models

June 6, 2017 1 min read
Mark Benson on Cybersecurity Panel at University of Minnesota

Mark Benson on Cybersecurity Panel at University of Minnesota

June 5, 2017 1 min read
4 Best Practices for Modeling a Digital Twin

4 Best Practices for Modeling a Digital Twin

May 30, 2017 3 min read
Modeling the Digital Twin

Modeling the Digital Twin

May 23, 2017 1 min read

Exosite Blog

News, Articles, Thoughts, Product Information

July 20, 2017

Layering on the security can never be a bad thing when it comes to developing your IoT ecosystem, especially since it helps deters more hackers and keeps your name out of the news headlines.

July 11, 2017

When it comes to developing a practical IoT security strategy, you really can’t get enough of the basics. That’s why your security strategy should involve layering proven security technologies, which creates a depth that yields better results and deters more hackers.

July 6, 2017

The first step in developing a comprehensive IoT security strategy is understanding the core technology concepts in the realm of security—data, control, and hardware. Developing an understanding of these concepts can help organizations learn how to better prevent attacks, mitigate impacts, and recover from attacks on IoT systems. We’ll explain each of these concepts in depth and provide considerations when contemplating security for each.

June 28, 2017

Exosite’s Murano IoT platform and ARM mbed Cloud IoT device-management service simplify and accelerate secure connected-product development

June 27, 2017

Technology has always been a step ahead of the culture that develops it. Cars existed long before roads, safety standards, and laws governing driving came into being. Similarly, IoT security continues to make technological improvements in leaps and bounds, while the culture critical to successful (and secure) usage lags behind.

June 26, 2017

Award recognizes the most progressive companies in Minnesota                                 

June 23, 2017

Event is largest gathering of engineers and engineering professionals involved in sensors and sensing-related technologies

June 21, 2017

Podcasts have been getting more popular, so we’re hopping on the bandwagon! Our first episode, Scary Secure, is an interview with Rob Viren, the author of our latest white paper Best Practices to Build a Pragmatic Security Strategy for Industrial IoT. We discuss the elements of security that organizations often overlook and how they can impact people as well as products. Rob covers the basics of IoT security, as well as his own experience with security in the nuclear power industry.

June 20, 2017

Augmented digital twins are the virtual concept that bring true value to IoT by enabling predictive and prescriptive analytics to run on the data from physical assets. Enlightening your devices to respond to upcoming problems or detect failures is essential to provide new insights and defeat downtime for any organization that wants to evolve their market.

June 16, 2017

Event to highlight the rapidly changing landscape driven by the emergence of the Internet of Things across industries

June 13, 2017

Once you know about the 3 types of digital twin maturity, you can start to understand how the digital twin reflects and anticipates time-based events from the real world, aka asset reporting frequency. The frequency of state and condition changes are reflected in a digital twin, which determines what decisions can be made using its own data.

June 6, 2017

Maturity models for digital twins can be classified based on the level of information known about an asset and its environment (maturity). The maturity model shows how a digital twin can improve over time as more data (and derivative knowledge) is accumulated.

June 5, 2017

June 2, 2017 – Join Exosite CTO Mark Benson and other cybersecurity experts for a night of Q&A. As millions more medical, energy, commercial, and consumer products come online, the lack of design for security becomes a larger issue. These security experts will discuss the impacts of security design and how to illuminate the path toward a more secure future for technology.

May 30, 2017

You know what a digital twin is if you’ve seen any of the news articles focusing on this emerging trend in IoT, but how do you develop a successful virtual sibling for your devices? There are four main practices to keep in mind when creating them:

May 23, 2017

Digital twins are all the rage in technology at the moment, especially featured at this year’s Hannover Messe. We’ve covered what a digital twin is and why it’s important, so now we’ll get into how to mold it into what you need it to be.

Subscribe to Updates