Trusted Factory Provisioning for Trusted IoT Devices: A How-To Guide

In a recent blog, one of the leading voices in IoT security highlighted the importance of IoT devices that are secure by design and how device management platforms can help secure a growing attack surface from cybercriminals. David Rogers MBE, who co-authored the UK’s Code of Practice for...
Can we Cope with Data Density Presented by the IoT?

The quantity of IoT devices being deployed is vast, yet it's minuscule when you compare it to the density of the data those devices generate. The latest Tech Trends Report by IoT Global Network has been working with Arm to bring you the latest themes and how device and data management platforms...
Arm Pelion Device Management Release

The secure management of IoT devices at scale is the hardest aspect of IoT deployments. In the latest release of Pelion Device Management, we are providing additional features to enable constrained IoT devices, that operate in more challenging network scenarios, with additional hardware and...
Is Device Management the Key to a Secure IoT?

David Rogers MBE is the author of the UK’s Code of Practice for Security in Consumer IoT and Services, in collaboration with DCMS, the NCSC, industry, and academia. Here, David discusses how device management platforms can help secure a growing IoT attack surface: The days of shipping a product...
Powering Secure, Scalable Smart Meter Deployments: A guide for Utility Companies

The Internet of Things (IoT) is transforming how energy and water are provisioned around the world. Smart devices, connectivity, and infrastructures are accelerating that transformation, creating new opportunities for utility companies. Smart Meters: Gauging the Potential According to ABI...