LOCH Technology Blog
LOCH offers powerful RF intelligence for wireless IT, IoT, IIoT, and OT landscapes, empowering organizations to fortify their security defenses, mitigate risks, and proactively address concealed threats that endanger their business operations.
HIPAA mandates incident response plan to maintain compliance
Covered entities must develop a data backup plan, a disaster recovery plan, and an emergency mode operation plan, among other administrative safeguards.
UK Government introduced Product Security & Telecommunications Infrastructure (PSTI) Bill to strengthen IoT Security
SOURCE: Ryan Daws, TechForge Media, 25th Nov. ‘21
LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report
LOCH Technologies has been named a ‘Cool Vendor’ in the Gartner 2021 Edge Computing report, which highlights vendors who are solving the “complexity problem” of edge computing in..
802 Secure and AT&T partner to secure the IoT airspace
The new cyber-security offering, currently in adoption by government agencies for the AirShield P25CleanRF, has been released to support AT&T’s enterprise-scale wireless security..
802 Secure: The Shield for the IoT Ecosystem
AirDecoy is an IoT and wireless deceptive networking leveraged by 802 Secure to lure adversaries into it.
Garry Drummond: A Veteran Enthusiast of Information Security
The Problem that we solve – 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only..
802 SECURE, INC.: Developing advanced Technology for securing the internet of things (IoT), combining Software defined Radio with Big Data Analytics
802 Secure is developing solutions to help defend enterprise and government agencies from new attack vectors that cross the broader RF spectrum by offering a defense-in-depth..
802 Secure Honored as Gold and Bronze Winner in the 11th Annual 2015 Security Industry’s Global Excellence Awards
802 Secure’s Wireless Risk Audit Tool (WRAT) offers the industry’s most innovative, cloud-based wireless intrusion detection and deception solution. Unlike existing solutions,..
Don’t worry about shadow IT. Shadow IoT is much worse.
Shadow IoT – the use of unauthorized internet of things devices and networks – poses a new level of threats for enterprises.Organizations need to broaden their view into these..