Author : Vish Pai

  •             b FIGURE+  ( )

    An end-to-end approach is needed for IoT device security

    Posted by Vish Pai on May 22, 2015

    As IoT Devices Proliferate, the Vulnerabilities Scale Linearly 

    Most of the "things" connected to the Internet of Things (IoT) are produced companies not accustomed to thinking in terms of connectivity. These manufacturers are experts in water heaters or door locks or coffee makers, but they probably don't know what a really good connected water heater or door lock or coffee maker should be. And they certainly haven't had to worry about the kinds of security threats that come with IoT connectivity.

  • Understanding Ayla Persistent Communication

    Posted by Vish Pai on Sep 15, 2014

    With the Amazon Kindle, it takes a mere 60 seconds to download a book, and if you purchase a book on, it’s instantly available on your kindle device. Have you ever wondered how this is accomplished?