twitter.com Open in urlscan Pro
104.244.42.129  Public Scan

Submitted URL: https://email.netfoundry.io/e3t/Ctc/ON*113/cpY1h04/MVR3-Rs4pKTN16f5MXWSfdJV5XFwB4XzZ6VN880g3Z3q3nJV1-WJV7CgMTvW2wTvNz5n3yRGW...
Effective URL: https://twitter.com/NetFoundry?utm_campaign=IoT%20%26%20Edge%20Networking%20Use%20Case&utm_medium=email&_hsmi=248095...
Submission: On February 28 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

#

<form action="#" aria-label="Twitter durchsuchen" role="search" class="r-1oszu61 r-1phboty r-1yadl64 r-deolkf r-6koalj r-13awgt0 r-eqz5dr r-crgep1 r-ifefl9 r-bcqeeo r-t60dpp r-bnwqim r-417010">
  <div class="css-1dbjc4n r-1wbh5a2">
    <div class="css-1dbjc4n r-1sw30gj r-42olwf r-sdzlij r-1phboty r-rs99b7 r-eqz5dr r-16y2uox r-1wbh5a2 r-1777fci">
      <div class="css-1dbjc4n">
        <div class="css-1dbjc4n r-1awozwy r-18u37iz"><label class="css-1dbjc4n r-1dqbpge r-13awgt0 r-18u37iz" data-testid="SearchBox_Search_Input_label">
            <div class="css-1dbjc4n r-7q8q6z r-6koalj r-1777fci"><svg viewBox="0 0 24 24" aria-hidden="true" class="r-14j79pv r-4qtqp9 r-yyyyoo r-1xvli5t r-dnmrzs r-4wgw6l r-f727ji r-bnwqim r-1plcrui r-lrvibr">
                <g>
                  <path
                    d="M10.25 3.75c-3.59 0-6.5 2.91-6.5 6.5s2.91 6.5 6.5 6.5c1.795 0 3.419-.726 4.596-1.904 1.178-1.177 1.904-2.801 1.904-4.596 0-3.59-2.91-6.5-6.5-6.5zm-8.5 6.5c0-4.694 3.806-8.5 8.5-8.5s8.5 3.806 8.5 8.5c0 1.986-.682 3.815-1.824 5.262l4.781 4.781-1.414 1.414-4.781-4.781c-1.447 1.142-3.276 1.824-5.262 1.824-4.694 0-8.5-3.806-8.5-8.5z">
                  </path>
                </g>
              </svg></div>
            <div class="css-1dbjc4n r-16y2uox r-1wbh5a2">
              <div dir="ltr" class="css-901oao r-18jsvk2 r-6koalj r-37j5jr r-a023e6 r-16dba41 r-rjixqe r-bcqeeo r-qvutc0"><input aria-activedescendant="typeaheadFocus-0.22048506427642378" aria-autocomplete="list" aria-label="Suchanfrage"
                  aria-owns="typeaheadDropdown-1" autocapitalize="sentences" autocomplete="off" autocorrect="off" placeholder="Twitter durchsuchen" role="combobox" spellcheck="false" enterkeyhint="search" type="text" dir="auto"
                  class="r-30o5oe r-1niwhzg r-17gur6a r-1yadl64 r-deolkf r-homxoj r-poiln3 r-7cikom r-1ny4l3l r-xyw6el r-y0fyvk r-1dz5y72 r-fdjqy7 r-13qz1uu" data-testid="SearchBox_Search_Input" value=""></div>
            </div>
            <div class="css-1dbjc4n r-6koalj r-1777fci"></div>
          </label></div>
      </div>
    </div>
  </div>
  <div class="css-1dbjc4n r-13awgt0 r-bnwqim"></div>
</form>

Text Content

JAVASCRIPT IST NICHT VERFÜGBAR.

Wir haben festgestellt, dass JavaScript in diesem Browser deaktiviert ist.
Aktiviere JavaScript bitte oder wechsle zu einem unterstützten Browser, um
twitter.com weiter zu nutzen. Eine Liste der unterstützten Browser findest du in
unserem Hilfe-Center.

Hilfe-Center

Allgemeine Geschäftsbedingungen Datenschutzrichtlinien Cookie-Richtlinie
Impressum Anzeigen-Info © 2023 Twitter, Inc.

Lass dir nichts Neues entgehen
Wer auf Twitter ist, weiß als Erster Bescheid.
Anmelden
Registrieren
Hat jemand … Cookies gesagt?
Twitter und seine Partner verwenden Cookies, um dir einen besseren, sichereren
und schnelleren Dienst zu bieten und um unser Unternehmen zu unterstützen.
Einige Cookies sind notwendig, um unsere Dienste zu nutzen, unsere Dienste zu
verbessern und sicherzustellen, dass sie ordnungsgemäß funktionieren. Zeige mehr
über deine Auswahlmöglichkeiten.
Alle Cookies akzeptieren
Unwesentliche Cookies ablehnen

Entdecken
Einstellungen
NETFOUNDRY

3.534 Tweets

Neue Tweets ansehen

Folgen
Klicken, wenn du NetFoundry Folgen möchtest
NetFoundry
@NetFoundry

Use our platform and APIs to spin up global, secure, application-specific
networks
NetFoundry.ioSeit Januar 2017 bei Twitter
3.424 Folge ich
1.500 Follower
Tweets

Tweets und Antworten

Medien

Gefällt mir




TWEETS VON NETFOUNDRY

NetFoundry

@NetFoundry
·
3 Std.

The logistics IoT ecosystem enables the creation of a consistent digital supply
chain in which all participants – vehicles, warehouses, and cargo – interact.
This is why cyberattacks are often responsible for shutting down multiple
organizations at a time.
rcrwireless.com
Five global IoT trends for the logistics sector – supply chains in 2023 (Reader
Forum)
2022 showed how vulnerable logistics networks really are. Can enterprise IoT
solutions help deal with all this legacy chaos? PSA reckon so.
1

16

NetFoundry

@NetFoundry
·
27. Feb.

No surprise remote health monitoring networks is a key innovation area in #IoT.
But with innovation comes security risks, in particular protecting critical
patient data as it is sent to proximate healthcare facilities with very low
end‐to‐end latency. https://bit.ly/414j43S
1
1
31

NetFoundry

@NetFoundry
·
23. Feb.

Almost one year has passed since @McKinseypublished "IoT Comes of Age" and the
accompanying podcast, but the themes around the explosion in #IoT adoption and
why successful implementation still eludes organizations is increasingly
relevant. https://mck.co/3EhCWqw #iotsecurity
mckinsey.com
IoT comes of age
In this podcast episode, McKinsey partners Michael Chui and Mark Collins discuss
the Internet of Things and how to successfully implement IoT technology.
2
3
92

NetFoundry

@NetFoundry
·
22. Feb.

For most, being proactive about #IoT security means designing and building
better security protocols into IoT devices. Yet attacks continue to occur.
#CloudZiti mitigates breaches impacting providers and customers with a simple,
software only solution.
darkreading.com
The Evolution of Account Takeover Attacks: Initial Access Brokers for IoT
Head off account takeover attacks by being proactive about IoT security. Start
with designing and building better security protocols into IoT devices, always
change weak default configurations, and...
1
4
48

NetFoundry

@NetFoundry
·
21. Feb.

Building trust in IoT ecosystems means reducing their inherent security risks.
This means securing devices at every level, which requires a comprehensive
approach that addresses potential vulnerabilities at these levels, from the
hardware to the software.
dataconomy.com
What Is IoT Cybersecurity? - Dataconomy
As the Internet of Things (IoT) continues to grow in popularity, so does the
need for IoT cybersecurity. IoT refers to the interconnected network of devices,
1
3
74

NetFoundry

@NetFoundry
·
9. Feb.

Old API versions are usually unpatched and are an easy way to compromise systems
without having to fight state-of-the-art security mechanisms, which might be in
place to protect the most recent API versions. Download our solution brief.
https://bit.ly/3RiQibi
@owasp
@CISecurity

1
2
77

NetFoundry

@NetFoundry
·
7. Feb.

In this vulnerability, the attacker’s malicious data can trick the interpreter
into executing unintended commands or accessing data without proper
authorization. Download our solution brief to learn more. https://bit.ly/3HgOfQx
@owasp
@SIIA
@DevsAlliance
#cloudziti #apisecurity

2
5
123

NEU BEI TWITTER?


Registriere dich jetzt, um deine eigene personalisierte Timeline zu erhalten!
Mit Apple registrieren
Account erstellen
Indem du dich registrierst, stimmst du den Allgemeinen Geschäftsbedingungen und
Datenschutzrichtlinien sowie der Nutzung von Cookies zu.



AKTUELLE TRENDS

TRENDS FÜR DICH


Trend in Deutschland
StVO

Trend in Deutschland
Wärmepumpen
2.992 Tweets

Trend in Deutschland
Ernährung
1.766 Tweets

Trend in Deutschland
Handschuhen

Trend in Deutschland
Halsweh

Trend in Deutschland
Herstellung

Trend in Deutschland
Zuckersteuer

Trend in Deutschland
Lumpenpazifisten
3.824 Tweets

Trend in Deutschland
Kirche
3.800 Tweets

Trend in Deutschland
Heizungen
7.351 Tweets

Mehr anzeigen
Allgemeine GeschäftsbedingungenDatenschutzrichtlinienCookie-RichtlinieMStV
TransparenzangabenImpressumBarrierefreiheitAnzeigen-Info
Mehr
© 2023 Twitter, Inc.