Inpixon Blog | Security

3 Questions to Ask Government WIDS Vendors

5 minute read |
September 15, 2020

The Vulnerabilities Facing Modern Workplaces

4 minute read |
April 22, 2020
  As buildings become smarter and more connected, the risks and vulnerabilities that they face change as well. Many organizations have put measures in place to prevent...

The Industries at Risk of Eavesdropping and Data Breaches

7 minute read |
March 12, 2020
Across the board, the number of data breaches and security incidents continue to rise every year, but some industries are feeling the pressure more than others. While...

Indoor Security: The Rooms that Must be Monitored

4 minute read |
February 27, 2020
On a large corporate campus, there are some areas that require greater sensitivity than others. As we shared in our recent article on smartphones in smart spaces, one of...

Smartphones in Smart Spaces: Why Secure WiFi Isn’t Enough

4 minute read |
February 13, 2020
Smartphones are ubiquitous in the workplace for good reason. They are important communication tools and productivity enhancers. They’re also the most common security...

Privacy by Design -- The GDPR, and Inpixon's Proactive Commitment to Privacy and Security

4 minute read |
December 18, 2018
It’s been many months since I first heard about General Data Protection Regulation (GDPR), and to be honest, at first I assumed it was one of those idealized,...

Is the Most Important Room in Your Company Really Secure?

3 minute read |
June 25, 2018
Someone Might Be Listening

Deter and Delay Is No Longer Enough: How Inpixon Can Help Focus Response Resources and Improve School Safety

6 minute read |
June 8, 2018
Recent events have pointed out the need for new and enhanced approaches to safety and security in schools. While the truth is that active shooter events are rare, the...

Bluesnarfing: The Modern-Day Security Vulnerability

6 minute read |
April 18, 2018
  Once known as the next big thing in wireless communication since the invention of mobile phones, Bluetooth technology has since gained a reputation as one of the gaping...

Why You May Need to Rethink Your IoT Security Plan

4 minute read |
January 4, 2018
Traditional cybersecurity methods are playing catch-up with the technology of  today. The warning signs were there years ago, and the Internet of Things (IoT)  is...
x

SUBSCRIBE TO OUR BLOG

Advice, stories, and expertise about work life today.

x

THANK YOU!

We know your inbox is protected space, so we promise to send only the good stuff, twice a month.