Skip to content

LOCH Technology Blog

LOCH offers powerful RF intelligence for wireless IT, IoT, IIoT, and OT landscapes, empowering organizations to fortify their security defenses, mitigate risks, and proactively address concealed threats that endanger their business operations.

HIPAA mandates incident response plan to maintain compliance

Covered entities must develop a data backup plan, a disaster recovery plan, and an emergency mode operation plan, among other administrative safeguards.

Read More

LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report

LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report, which highlights vendors who are solving the “complexity problem” of edge computing in..

Read More

802 Secure and AT&T partner to secure the IoT airspace

The new cyber-security offering, currently in adoption by government agencies for the AirShield P25CleanRF, has been released to support AT&T’s enterprise-scale wireless security..

Read More

802 Secure: The Shield for the IoT Ecosystem

AirDecoy is an IoT and wireless deceptive networking leveraged by 802 Secure to lure adversaries into it.

Read More

Garry Drummond: A Veteran Enthusiast of Information Security

The Problem that we solve – 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only..

Read More

802 SECURE, INC.: Developing advanced Technology for securing the internet of things (IoT), combining Software defined Radio with Big Data Analytics

802 Secure is developing solutions to help defend enterprise and government agencies from new attack vectors that cross the broader RF spectrum by offering a defense-in-depth..

Read More

802 Secure Honored as Gold and Bronze Winner in the 11th Annual 2015 Security Industry’s Global Excellence Awards

802 Secure’s Wireless Risk Audit Tool (WRAT) offers the industry’s most innovative, cloud-based wireless intrusion detection and deception solution. Unlike existing solutions,..

Read More

Don’t worry about shadow IT. Shadow IoT is much worse.

Shadow IoT – the use of unauthorized internet of things devices and networks – poses a new level of threats for enterprises.Organizations need to broaden their view into these..

Read More