Soracom achieves SOC 2 Type 2-Certification
Achieving Type 2 compliance confirms that Soracom’s systems and controls have not only been designed to meet rigorous […]
Achieving Type 2 compliance confirms that Soracom’s systems and controls have not only been designed to meet rigorous […]
Meta and Yandex reportedly tracked Android users through a previously unknown method using localhost connections. Experts warn […]
The attacks are said to have occurred without any interaction from the affected users and exploited security […]
Mixed feedback on the "Cyber Resilience Act" (CRA) published by the EU. Stricter rules for IT software […]
The internet of things (IoT) and industrial internet of things (IIoT) have become incredibly popular with consumers […]
IoT Markets, Security, Use Cases, Smart Gadgets or the Internet of Trash? Let’s take a closer look.
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.