Garry Drummond
Garry Drummond is the Founder of Loch Technologies

Gartner Recognizes LOCH Technologies
Gartner Recognizes LOCH Technologies For the 3rd time in a row, Gartner lists LOCH Technologies as a representative vendor in their 2023 Market Guide for Medical Device Security..

HIPAA mandates incident response plan to maintain compliance
Covered entities must develop a data backup plan, a disaster recovery plan, and an emergency mode operation plan, among other administrative safeguards.

UK Government introduced Product Security & Telecommunications Infrastructure (PSTI) Bill to strengthen IoT Security
SOURCE: Ryan Daws, TechForge Media, 25th Nov. ‘21

Smart Casinos: Digital Sportsbooks, Casinos, and the Omnichannel Experience (Part 3)
This is Part 3 of our 5-part article series, Smart Casinos: Consumer Engagement at the Edge. In Part 2, we looked at continuous feedback loops and marketing personalization. Here..

Smart Casinos: How Feedback Loops Can Modernize the Casino Industry (Part 2)
This is Part 2 of our 5-part article series, Smart Casinos: Consumer Engagement at the Edge. Written by Les Ottolenghi, former CIO at Caesars Entertainment, Smart Casinos spans..

LOCH Named a ‘Cool Vendor’ the Gartner 2021 Edge Computing Report
We are thrilled to announce that LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report, which highlights vendors who are solving the..

LOCH Technologies Named a Cool Vendor in Gartner 2021 Edge Computing Report
EMERYVILLE, Calif. — May. 26, 2021 — LOCH Technologies, the leader in wireless and wireless IoT security, today announced that it has been named a Cool Vendor in the Gartner Cool..

Smart Casinos: Real-Time Marketing On the Casino Floor (Part 1)
We’re excited to introduce our 5-part article series, Smart Casinos: Consumer Engagement at the Edge. Written by Les Ottolenghi, former CIO at Caesars Entertainment, Smart Casinos..

Wi-Fi Fragmentation Attack Highlights Risks of IoT Wireless
A new type of Wi-Fi attack is impacting virtually every Wi-Fi product on the planet, from the original WEP specification from 1997 to the WPA3 protocol today. These sets of..

Colonial Pipeline Ransomware Attack: The Urgent Need to Secure Internet-Connected Infrastructure from New Threats
On May 7th, reports surfaced that Colonial Pipeline, operators of the country’s largest fuel pipeline, were impacted by a ransomware attack from hackers linked to Eastern European..