Author: Nemertes Webinars

Shifting to a zero-trust model is imperative if your goal as a cybersecurity professional is to get away from the perimeter-based model. But: • What are the components of zero trust, and what does it take to implement them? • What should you do first, second, and...

The future is programmable, and everyone in the IT organization will have to be ready to code in order to keep things charging ahead. They won't all be writing in Go or Ruby or Python but they'll be writing and maintaining code constantly to tailor,...

What really works when it comes to protecting your IoT network? There's plenty of advice out there, but which best practices correlate with successful IoT initiatives? This webinar provides actionable guidance based on Nemertes' global study on 403 enterprise users of IoT....

IoT is a foundational technology that enables Digital Transformation. But what does it take to make IoT successful in an industrial environment? In Nemertes' in-depth study of 403 companies deploying IoT, we zeroed in on the techniques and technologies that companies are deploying to ensure...