Exosite Blog

Announcements, updates, news, and more.

Security by Design: Architecture Considerations for Protection

Security by Design: Architecture Considerations for Protection

July 25, 2017 1 min read
“6 Early Symptoms Your IoT Initiative Will Fail” from Exosite’s Josh Simi

“6 Early Symptoms Your IoT Initiative Will Fail” from Exosite’s Josh Simi

July 21, 2017 1 min read
Getting Ahead of the Curve: Developing Proactive Responses to Security Threats

Getting Ahead of the Curve: Developing Proactive Responses to Security Threats

July 20, 2017 2 min read
IoT Security in Layers: Defense in Depth

IoT Security in Layers: Defense in Depth

July 11, 2017 2 min read
The 3 Core Technology Concepts of IoT Security You Need to Know

The 3 Core Technology Concepts of IoT Security You Need to Know

July 6, 2017 3 min read
Exosite Collaboration with ARM Provides Secure, Full-Stack IoT Solution

Exosite Collaboration with ARM Provides Secure, Full-Stack IoT Solution

June 28, 2017 3 min read
Not-so Doom & Gloom: Best Practices to Build a Pragmatic Security Strategy for IIoT

Not-so Doom & Gloom: Best Practices to Build a Pragmatic Security Strategy for IIoT

June 27, 2017 1 min read
Exosite Named a 2017 Top Workplace by the Star Tribune

Exosite Named a 2017 Top Workplace by the Star Tribune

June 26, 2017 2 min read
Exosite CTO Mark Benson to Present Keynote at the 2017 Sensors Expo and Conference

Exosite CTO Mark Benson to Present Keynote at the 2017 Sensors Expo and Conference

June 23, 2017 2 min read
Inside Exosite Podcast Kicks off with Scary Secure

Inside Exosite Podcast Kicks off with Scary Secure

June 21, 2017 1 min read
The Digital Twin and the Power of IoT

The Digital Twin and the Power of IoT

June 20, 2017 1 min read
Exosite CTO Mark Benson to Present at the 2017 IoT Slam® Internet of Things Conference

Exosite CTO Mark Benson to Present at the 2017 IoT Slam® Internet of Things Conference

June 16, 2017 2 min read
Asset Reporting Frequency: Sampling, Monitoring, and Real-Time

Asset Reporting Frequency: Sampling, Monitoring, and Real-Time

June 13, 2017 2 min read
The 3 Types of Digital Twin Maturity Models

The 3 Types of Digital Twin Maturity Models

June 6, 2017 1 min read
Mark Benson on Cybersecurity Panel at University of Minnesota

Mark Benson on Cybersecurity Panel at University of Minnesota

June 5, 2017 1 min read

Exosite Blog

News, Articles, Thoughts, Product Information

July 25, 2017

Proactive preparation works well, but when considering IoT security there are several methods that can be used in the design of a system to prevent and deter hacking events.

July 21, 2017

July 21, 2017 – When putting a quantitative measurement on failed IoT business ventures, nearly 3/4 of all IoT projects fail, according to Cisco. Exosite Digital Marketing Manager Josh Simi provides a list of common symptoms that indicate your IoT initiative may fail and how to prevent it before it’s too late to recover. Read the full article on LinkedIn here: http://hubs.ly/H087nWg0

July 20, 2017

Layering on the security can never be a bad thing when it comes to developing your IoT ecosystem, especially since it helps deters more hackers and keeps your name out of the news headlines.

July 11, 2017

When it comes to developing a practical IoT security strategy, you really can’t get enough of the basics. That’s why your security strategy should involve layering proven security technologies, which creates a depth that yields better results and deters more hackers.

July 6, 2017

The first step in developing a comprehensive IoT security strategy is understanding the core technology concepts in the realm of security—data, control, and hardware. Developing an understanding of these concepts can help organizations learn how to better prevent attacks, mitigate impacts, and recover from attacks on IoT systems. We’ll explain each of these concepts in depth and provide considerations when contemplating security for each.

June 28, 2017

Exosite’s Murano IoT platform and ARM mbed Cloud IoT device-management service simplify and accelerate secure connected-product development

June 27, 2017

Technology has always been a step ahead of the culture that develops it. Cars existed long before roads, safety standards, and laws governing driving came into being. Similarly, IoT security continues to make technological improvements in leaps and bounds, while the culture critical to successful (and secure) usage lags behind.

June 26, 2017

Award recognizes the most progressive companies in Minnesota                                 

June 23, 2017

Event is largest gathering of engineers and engineering professionals involved in sensors and sensing-related technologies

June 21, 2017

Podcasts have been getting more popular, so we’re hopping on the bandwagon! Our first episode, Scary Secure, is an interview with Rob Viren, the author of our latest white paper Best Practices to Build a Pragmatic Security Strategy for Industrial IoT. We discuss the elements of security that organizations often overlook and how they can impact people as well as products. Rob covers the basics of IoT security, as well as his own experience with security in the nuclear power industry.

June 20, 2017

Augmented digital twins are the virtual concept that bring true value to IoT by enabling predictive and prescriptive analytics to run on the data from physical assets. Enlightening your devices to respond to upcoming problems or detect failures is essential to provide new insights and defeat downtime for any organization that wants to evolve their market.

June 16, 2017

Event to highlight the rapidly changing landscape driven by the emergence of the Internet of Things across industries

June 13, 2017

Once you know about the 3 types of digital twin maturity, you can start to understand how the digital twin reflects and anticipates time-based events from the real world, aka asset reporting frequency. The frequency of state and condition changes are reflected in a digital twin, which determines what decisions can be made using its own data.

June 6, 2017

Maturity models for digital twins can be classified based on the level of information known about an asset and its environment (maturity). The maturity model shows how a digital twin can improve over time as more data (and derivative knowledge) is accumulated.

June 5, 2017

June 2, 2017 – Join Exosite CTO Mark Benson and other cybersecurity experts for a night of Q&A. As millions more medical, energy, commercial, and consumer products come online, the lack of design for security becomes a larger issue. These security experts will discuss the impacts of security design and how to illuminate the path toward a more secure future for technology.

Subscribe to Updates