- Secure IoT Platforms
- Connected Vehicles
- Why Aeris?
- About Us
- News & Press
- Resources Library
- Get Started
Aeris is the leader in IoT Communications. Here you can find white papers, case studies, webinars, and other information about how Aeris helped others with their connectivity needs and how we can help you with yours.
The year 2023 has witnessed yet another upsurge in cyber threats. Recent headlines such as the ransomware gang stealing a staggering 1.3TB of data from Sabre in September 2023 have underscored the inherent challenges in digital security. This article delves into the top corporate cybersecurity breaches of 2023, offering insights into the evolving threat landscape and underscoring the necessity for effective defense mechanisms.
With cyber threats growing in scale and sophistication, new SEC cybersecurity regulations set for December 18th will fundamentally reshape how we govern digital risk. These regulations are designed to bolster transparency and governance in how public companies handle cyber risks and incidents. This article delves into the intricacies of these regulations, outlining what they entail, the steps companies must take to comply, and the broader implications for the corporate landscape.
Real-time tank level measuring increases efficiency and reduces costs. Regardless of location, tank levels, can be actively monitored via cellular connectivity, making maintaining and refilling more efficient and cost-effective.
An imminent threat might be going unnoticed in your cold chain operation: compromised cellular-connected IoT devices.
Over the past few years, IoT devices and applications have become new targets for attackers. The ever-growing number of deployed devices, which are increasingly more intelligent than ever, provide targets that are far too easily exploitable. As devices become smarter, attackers are discovering new weaknesses that offer an opportunity for successful breaches.
3G cellular connectivity was largely sunset by carriers last year, paving the road to 4G. However, experts estimate that 4G could see a sunset sometime between 2030 and 2035.
Powered by IoT Accelerator, GrandPad bridges the digital age divide by helping the elderly stay connected. Social isolation and loneliness is something the elderly often have to cope with, but GrandPad\’s tablet and cellular connectivity is helping seniors better engage with loved ones and caregivers.
Across all industries, organizations are leveraging smart technologies like artificial intelligence (AI) and machine learning (ML) to improve processes and cut down on time-consuming manual tasks. Adoption of these technologies has grown, with IBM reporting in 2022 that over one-third (35%) of surveyed companies are using AI in their businesses to some degree.
The first half of 2023 saw an increase in cellular IoT malware attacks, with SonicWall threat researchers recording 77.9 million attacks, a 37% increase from 2022. Now more than ever, organizations managing IoT programs must take the necessary steps to secure their solutions across all levels – device, network, and application.
Earlier this year, Mark Cratsenburg, Aeris General Manager of Aeris\’ IoT Business, spoke at the CXO Forum, the Bridge Alliance\’s flagship event held in Singapore. As a continuation of that conversation, Mar also recently sat down with Ken Wee, Bridge Alliance SVP of Alliance Partnerships and New Business, and spoke to him about Aeris\’ new mission following its acquisition of the Ericsson IoT Accelerator and Connected Vehicle Cloud businesses.
The first real step enterprises must take to secure their cellular IoT investments is to set a definitive IoT security budget. But this process is easier said than done. For one thing, landing on a concrete budget requires cross-enterprise collaboration among stakeholders, research, and frequent discussion on how to approach cellular IoT security.
From the very beginning of conceptualizing a cellular IoT project, enterprises must make security a priority. Given the difficulties associated with securing connected devices, enterprises must make cybersecurity a priority to ensure their investments are protected.