blog_posts: d193e9dcb2
This data as json
id | createdDate | title | link | postExcerpt | featuredImageUrl | hash | contributors | modifiedDate | displayDate |
---|---|---|---|---|---|---|---|---|---|
blog-posts#25-14973 | 2024-03-25 19:22:16 | Use AWS IoT Device Defender and Splunk to monitor the security posture of your IoT application | https://aws.amazon.com/blogs/iot/use-aws-iot-device-defender-and-splunk-to-monitor-the-security-posture-of-your-iot-application/ | With the growing adoption of Internet of Things (IoT) applications in regulated industries, such as healthcare, hardening IoT security devices has become a requirement. In addition to ensuring that backend systems are resilient, organizations increasingly invest effort to secure devices outside the traditional enterprise perimeter with zero trust principles. For example, fleet operators for connected [...] | https://d2908q01vomqb2.cloudfront.net/f6e1126cedebf23e1463aee73f9df08783640400/2024/03/20/feature_image_v0.1-300x169.png | d193e9dcb2 | Alan Peaty, Andre Sacaguti, Amandeep Singh, Travis Kane | 2024-03-25 19:22:16 | 25 Mar 2024 |
Links from other tables
- 17 rows from blog_post_hash in blog_post_tags