logo
episode-header-image
Sep 12
35m 33s

3418: Scaling IoT Security with Real Tim...

NEIL C. HUGHES
About this episode

Here’s the thing. Connecting thousands of devices is the easy part. Keeping them resilient and secure as you grow is where the real work lives. In this episode, I sit down with Iain Davidson, Senior Product Manager at Wireless Logic, to unpack what happens when connectivity, security, and operations meet in the real world. Wireless Logic connects a new IoT device every 18 seconds, with more than 18 million active subscriptions across 165 countries and partnerships with over 750 mobile networks. That reach brings hard lessons about where projects stall, where breaches begin, and how to build systems that can take a hit without taking your business offline.

Iain lays out a simple idea that more teams need to hear. Resilience and security have to scale at the same pace as your device rollouts. He explains why fallback connectivity, private networking, and an IoT-optimised mobile core such as Conexa set the ground rules, but the real differentiator is visibility. If you cannot see what your fleet is doing in near real time, you are guessing. We talk through Wireless Logic’s agentless anomaly and threat detection that runs in the mobile core, creating behavioural baselines and flagging malware events, backdoors, and suspicious traffic before small issues become outages. It is an early warning layer for fleets that often live beyond the traditional IT perimeter.

We also get honest about risk. Iain shares why one in three breaches now involve an IoT device and why detection can still take months. Ransomware demands grab headlines, but the quiet damage shows up in recovery costs, truck rolls, and trust lost with customers. Then there is compliance. With new rules tightening in Europe and beyond, scaling without protection does not only invite attackers. It can keep you out of the market. Iain’s message is clear. Bake security in from day one through defend, detect, react practices, supply chain checks, secure boot and firmware integrity, OTA updates, and the discipline to rehearse incident playbooks so people know what to do when alarms sound.

What if you already shipped devices without all of that in place? We cover that too. From migrating SIMs into secure private networks to quarantining suspect endpoints and turning on core-level detection without adding agents, there are practical ways to raise your posture without ripping and replacing hardware. Automation helps, especially at global scale, but people still make the judgment calls. Train your teams, run simulations, and give both humans and digital systems clear rules for when to block, when to escalate, and when to restore from backup.

I left this conversation with a simple takeaway. Growth is only real if it is durable. If you are rolling out EV chargers, medical devices, cameras, industrial sensors, or anything that talks to the network, this episode gives you a working playbook for scaling with confidence. Connect with Iain on LinkedIn, explore the IoT security resources at WirelessLogic.com, or reach the team at hello@wirelesslogic.com.

*********

Visit the Sponsor of Tech Talks Network:

Land your first job  in tech in 6 months as a Software QA Engineering Bootcamp with Careerist

https://crst.co/OGCLA

Up next
Today
3448: Inside Kore.ai’s Mission to Make AI Accessible for Everyone
Two years after our last conversation, Raj Koneru, CEO and Founder of Kore.ai, returns to discuss how the world of AI has changed and how much of it still needs to. When we first spoke, conversational AI was promising. Now it is powering over a billion interactions every day for ... Show More
30m 19s
Yesterday
3447: How DXC Is Using AI to Outsmart Cybercriminals
In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defense ... Show More
28m 36s
Oct 8
3446: How Atlassian Is Redefining Teamwork with AI at Team 25
What happens when the future of teamwork collides with the power of AI? That’s the question at the heart of this episode as Tiffany from Atlassian joins me from Barcelona during Team 25, where Atlassian is showcasing how AI-powered collaboration is redefining how work gets done. ... Show More
34m 26s
Recommended Episodes
Feb 2025
Rethinking Cloud Security Strategies
Cloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, about how platformization is resh ... Show More
35m 28s
Mar 2025
#243 Greg Osuri: Why the Future of AI Depends on Decentralized Cloud Platforms
This episode is sponsored by Indeed. Stop struggling to get your job post seen on other job sites. Indeed's Sponsored Jobs help you stand out and hire fast. With Sponsored Jobs your post jumps to the top of the page for your relevant candidates, so you can reach the people you wa ... Show More
59m 19s
Dec 2024
Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity
In this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity.  Meerah and Niall discuss how frictionless security, AI integration, ... Show More
39m 17s
Jun 2025
Bridging the Gap: AI and Cybersecurity in the Enterprise
In this episode of Cybersecurity Today, host Jim Love is joined by Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They begin the discussion with a report from Accenture that highlights the gap between the perceived and actual preparedness for cybersecu ... Show More
50m 50s
Jun 2025
Unlocking Enterprise Efficiency Through AI Orchestration - Kevin Kiley of Airia
Today’s guest is Kevin Kiley, President of Airia. With extensive experience helping large enterprises implement secure and scalable AI systems, Kevin joins Emerj Editorial Director Matthew DeMello to explore how agentic AI is reshaping enterprise workflows across industries like ... Show More
20m 59s
Sep 24
AI's Next Frontier: Privacy-Preserving Neural Networks
Jimmy Secretan, CTO of JustWin, explores the latest innovations in privacy-preserving neural networks, and explains how JustWin is leveraging AI to help small businesses win government contracts. He also explores the future directions of AI, and the impact of AI on user autonomy ... Show More
36m 44s
Feb 2025
DeepSeek: The Game-Changer in AI and the Impact on Cybersecurity
In this episode of Cybersecurity Today, host Jim Love dives deep into the latest advancements in AI technology with a focus on the new open-source model, DeepSeek, from China. Love discusses the significant cost differences in training and running this model compared to competito ... Show More
48m 19s
Jul 28
Cyber risk and security in an AI world: what’s in store?
In today's digital world, artificial intelligence, data storage and cybersecurity are a critical triumvirate, intersecting to form a dynamic ecosystem that underpins modern technological infrastructure. They are strategic pillars that drive innovation, operational efficiency and ... Show More
26m 10s
Oct 2024
Balancing Security with Usability in Cybersecurity
In this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operat ... Show More
41m 41s
Sep 10
LIVE from Rare Evo: How Citi is Bridging The Gap Between Web2 and Web3
Ryan Rugg, Global Head of Digital Assets for Citibank’s Treasury and Trade Solutions (TTS), discusses their approach to integrating Web 2.0 and 3.0. She shares insights on Citi Token Service, a new solution designed to provide 24/7 liquidity and borderless transactions, and expla ... Show More
18m 22s