Aeris is the leader in IoT Communications. Here you can find white papers, case studies, webinars, and other information about how Aeris helped others with their connectivity needs and how we can help you with yours.
The NIS2 Directive has come into full force across the EU, exposing utilities to stricter cybersecurity compliance amid increasing risks driven by the rapid growth of connected IoT devices like cellular connected smart meters. With stringent cybersecurity measures and potential penalties at stake, this regulation is set to reshape how European utilities manage their digital infrastructure. Compliance is not optional—it\’s critical.
NIS2 sets comprehensive cybersecurity obligations for Entities, focusing on strengthening the resilience of critical infrastructure. Articles 21 and 23 of the Directive focused on cybersecurity risk management and reporting obligations. They encapsulate the essence of strong cybersecurity and responsive incident management. European utility providers can leverage these mandates to not only meet compliance but fortify their operations against a rapidly evolving cyber threat landscape.
NIS2 is coming into full force across the EU, exposing utilities to stricter cybersecurity compliance amid increasing risks driven by the rapid growth of connected IoT devices, particularly cellular connected smart meters. The challenges faced by utilities are further complicated by the lack of IT security solutions…
Aeris IoT is driving tangible progress towards Sustainable Development Goals (SDGs) in Africa and beyond. Our technology bridges critical gaps in energy access, climate action, and water management by enabling our customers to implement solutions in areas where traditional approaches have fallen short.
In the rush to innovate and connect devices, it is easy to overlook a critical aspect of IoT deployments: security. While we have grown accustomed to thinking about security in terms of smartphones and computers, IoT devices present a unique and often underestimated challenge.
On July 19, 2024, an update to CrowdStrike software on Windows hosts caused a significant global IT outage. Although this was not a cyberattack, the effects were similarly disruptive. Reports say that airlines including Delta, American, RyanAir, and United Airlines are grounding flights due to communications issues related to the outage. Some electronic payment systems are down, preventing people from buying groceries.
As we approach 2024, the proliferation of connected devices is set to surpass 17 billion globally, a figure that underscores both the enormous potential and the significant challenges inherent in this technological revolution.
As the Internet of Things (IoT) is poised for explosive growth, with experts projecting a twofold increase in active devices by 2030, the need for reliable and seamless IoT connectivity has become paramount.
Are you ready to unlock the full potential of your IoT initiatives? Building successful IoT deployments can be challenging. But with the right strategies and partners, you can make your journey easier and achieve your goals for your connected solution.
On March 29, 2024, a software supply chain attack targeting the Linux operating systems was discovered by accident by an engineer working for Microsoft. The attack was named CVE-2024-3094, and it was given a severity score of 10.0, the highest rating. The attack involved the insertion of malicious code into open-source software called xz Utils which is commonly bundled with Linux distributions. The malicious code was a sort of back door that would have allowed remote code execution on the server.
Connected snack and beverage machines keep employee and client satisfaction full. Smarter vending machines, powered by cellular connectivity, are creating opportunities for office, retail, and public environments to enjoy refreshment-as-a-service.
The year 2023 has witnessed yet another upsurge in cyber threats. Recent headlines such as the ransomware gang stealing a staggering 1.3TB of data from Sabre in September 2023 have underscored the inherent challenges in digital security. This article delves into the top corporate cybersecurity breaches of 2023, offering insights into the evolving threat landscape and underscoring the necessity for effective defense mechanisms.
Δ