AWS Public Sector Blog

Category: AWS IoT Device Defender

AWS branded background with text overlay that says "4 common IoT protocols and their security considerations"

4 common IoT protocols and their security considerations

With the Internet of Things (IoT), selecting the right communication protocol ensures efficient data exchange and seamless connectivity between devices and the cloud. With a multitude of IoT protocols available, choosing the one that best suits your specific use case can be challenging. In this blog, we explore four common protocols used to connect IoT devices to the cloud and shed light on when and where to deploy them for optimal results.

AWS branded background design with text overlay that says "Secure your organization’s Internet of Things devices using AWS IoT"

Secure your organization’s Internet of Things devices using AWS IoT

The public sector’s use of Internet of Things (IoT) devices is steadily growing, as these organizations learn how to implement and derive value from IoT solutions. Public sector agencies and organizations deploy IoT devices in a variety of areas, such as transportation and infrastructure, crime prevention, education, and utilities and environment. In this post, we are going to use the Cybersecurity and Infrastructure Security Agency ‘s (CISA) guidelines as a reference to improve the security of your IoT devices and learn how to address vulnerabilities using Amazon Web Services (AWS) IoT services.

Securing and automating compliance in the public sector with AWS

Compliance is essential, but ensuring compliance in the cloud with various regulations and standards can be challenging, especially for public sector organizations. The requirements are highly dynamic, constantly evolving, and they vary across countries. Read this blog post to learn about the Amazon Web Services (AWS) resources that can help customers meet compliance requirements, reduce their time and effort, and focus on core business objectives.