Loch Technology Blog
LOCH provides full and actionable intelligence on all wireless and IoT devices to help organizations improve their security posture, reduce risk, and manage wireless data usage across the enterprise.
802 Secure: The Shield for the IoT Ecosystem
AirDecoy is an IoT and wireless deceptive networking leveraged by 802 Secure to lure adversaries into it.
Garry Drummond: A Veteran Enthusiast of Information Security
The Problem that we solve – 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only..
802 SECURE, INC.: Developing advanced Technology for securing the internet of things (IoT), combining Software defined Radio with Big Data Analytics
802 Secure is developing solutions to help defend enterprise and government agencies from new attack vectors that cross the broader RF spectrum by offering a defense-in-depth..
802 Secure Honored as Gold and Bronze Winner in the 11th Annual 2015 Security Industry’s Global Excellence Awards
802 Secure’s Wireless Risk Audit Tool (WRAT) offers the industry’s most innovative, cloud-based wireless intrusion detection and deception solution. Unlike existing solutions,..
Don’t worry about shadow IT. Shadow IoT is much worse.
Shadow IoT – the use of unauthorized internet of things devices and networks – poses a new level of threats for enterprises.Organizations need to broaden their view into these..
Garry Drummond Honored as CEO of the Year in the 2017 Info Security Product Guide – Global Excellence Awards
802 Secure received four other awards (in gold, silver and bronze categories) that brought recognition to their leading product, P25CleanRF. This product was a Gold Winner for..
802 Secure Announces Global OEM Agreement with Hewlett Packard Enterprise
“802 Secure’s Cyber Physical Security solution effectively fortifies IT and OT networks from IoT risks. By collaborating with 802 Secure, we are combining one of the industry’s..
#ISC2Congress: IoT Devices Pose Off-Network Security Risk
“The problem goes far above and beyond the potential breach of data or risks to that data. It also has an impact on safety, privacy, and the whole operation of your entire..
Winners Revealed for the 2021 IoT Innovator Awards
Our 2021 finalists and winners have significantly raised the bar when it comes to connecting billions of devices in a truly transformative way,” said Kim Kay, editor-in-chief of..
Mandiant and Nozomi Discover Critical IoT Weakness in Millions of Devices
Recently Mandiant Security disclosed a critical weakness in ThroughTek’s “Kalay” network which is widely used by millions of IoT devices. This work expanded on research disclosed..