Skip to content

Garry Drummond

Garry Drummond is the Founder of Loch Technologies

Gartner Recognizes LOCH Technologies

Gartner Recognizes LOCH Technologies For the 3rd time in a row, Gartner lists LOCH Technologies as a representative vendor in their 2023 Market Guide for Medical Device Security..

Read More

HIPAA mandates incident response plan to maintain compliance

Covered entities must develop a data backup plan, a disaster recovery plan, and an emergency mode operation plan, among other administrative safeguards.

Read More

Smart Casinos: Digital Sportsbooks, Casinos, and the Omnichannel Experience (Part 3)

This is Part 3 of our 5-part article series, Smart Casinos: Consumer Engagement at the Edge. In Part 2, we looked at continuous feedback loops and marketing personalization. Here..

Read More

Smart Casinos: How Feedback Loops Can Modernize the Casino Industry (Part 2)

This is Part 2 of our 5-part article series, Smart Casinos: Consumer Engagement at the Edge. Written by Les Ottolenghi, former CIO at Caesars Entertainment, Smart Casinos spans..

Read More

LOCH Named a ‘Cool Vendor’ the Gartner 2021 Edge Computing Report

We are thrilled to announce that LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report, which highlights vendors who are solving the..

Read More

LOCH Technologies Named a Cool Vendor in Gartner 2021 Edge Computing Report

EMERYVILLE, Calif. — May. 26, 2021 — LOCH Technologies, the leader in wireless and wireless IoT security, today announced that it has been named a Cool Vendor in the Gartner Cool..

Read More

Smart Casinos: Real-Time Marketing On the Casino Floor (Part 1)

We’re excited to introduce our 5-part article series, Smart Casinos: Consumer Engagement at the Edge. Written by Les Ottolenghi, former CIO at Caesars Entertainment, Smart Casinos..

Read More

Wi-Fi Fragmentation Attack Highlights Risks of IoT Wireless

A new type of Wi-Fi attack is impacting virtually every Wi-Fi product on the planet, from the original WEP specification from 1997 to the WPA3 protocol today. These sets of..

Read More

Colonial Pipeline Ransomware Attack: The Urgent Need to Secure Internet-Connected Infrastructure from New Threats

On May 7th, reports surfaced that Colonial Pipeline, operators of the country’s largest fuel pipeline, were impacted by a ransomware attack from hackers linked to Eastern European..

Read More