• Home
  • Products
  • IoT Market
  • Studies
  • Security
  • Standards
  • More
    • Internet of Trash
    • Use Cases
  • English
    • Deutsch (German)
  • Home
  • Products
  • IoT Market
  • Studies
  • Security
  • Standards
  • More
    • Internet of Trash
    • Use Cases
  • English
    • Deutsch (German)
Author

Andreas Wagner

Andreas Wagner entered the IT-area age 18 in 1978 and was an early adopter to new technologies since. Via Mainframes 1987 to Enterprise Networks in 1990 to IT-Security in 1995 he went into Monitoring of communication behaviour in form of network-forensics 2002. To complete his abilities in forensic investigations he topped up his knowledge with computer- and mobile forensic in 2006. In 2005 he moved to Saudi-Arabia permanently and organized Security-Operations-Centres as well as Incident-Response Teams. Back in Germany in 2014 he is responsible for Cybersecurity in basically all fields from finance, automotive, utilities and government in the disciplines Commercial-IT as well as Industrial-Control-Systems and IoT.




 Participate  / Security
Digitization, the big challenge for IT security
Andreas Wagner Posted On 5th March 2018

IoT Security

While researching this article, I realized that digitization and the commonly used term IoT, currently on everyone’s lips, is used in a variety of ways, actually just the umbrella term for a change in our society, in which everything – […]


Continue Reading
0




1

  • About WeSpeakIoT
  • Contributor Guidelines
  • Imprint
  • Privacy Statement (EU)
  • Cookie Policy (EU)
  • Disclaimer
© Copyright 2020-2025 Dennis Knake | WeSpeakIoT
Press enter/return to begin your search
We speak IoT
Manage your privacy
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show (non-) personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Manage options
  • {title}
  • {title}
  • {title}