Skip to main content
  1. Blog
  2. Article

Canonical
on 18 July 2018


Title: IoT Security at Scale: Managing end-to-end security for Commercial IoT Gateways

Speakers: Justin Rigling, CTO, Rigado

Date/Time: August 8, 12:00PM EST / 5:00PM BST

Rigado, a Canonical partner, provides a secure, scalable gateway solution to companies deploying large-scale Commercial IoT applications. In this webinar, Rigado will share their best practices for creating and managing IoT applications at thousands of locations, while maintaining end-to-end security from point of manufacture through to updates in the field. Rigado’s ‘Cascade’ infrastructure – utilising Ubuntu Core – offers a unique ‘edge-as-a-service’ solution to IoT teams that require edge connectivity and computing for applications such as asset tracking, smart buildings and sensing and monitoring.

Register for webinar

Related posts


Canonical
20 April 2026

Canonical expands Ubuntu support to next-generation MediaTek Genio 520 and 720 platforms

edge computing Canonical News

Canonical is pleased to announce the early access launch of Ubuntu 24.04 LTS for MediaTek’s Genio IoT platforms. Building on the companies’ strategic partnership, this release introduces optimized Ubuntu images for the brand-new Genio 520 and 720, while continuing to provide robust support for the Genio 350, 510, 700, and 1200.  The colla ...


Miona Aleksic
20 March 2026

Introducing MicroCloud Cluster Manager

Cloud and server Article

Canonical introduces the beta release of MicroCloud Cluster Manager, a new way to discover, organize, and operate your MicroCloud environments from a single, unified interface. ...


Luci Stanescu
12 March 2026

AppArmor vulnerability fixes available

Ubuntu Article

Qualys discovered several vulnerabilities in the AppArmor code of the Linux kernel. These are being referred to as CrackArmor, while CVE IDs are in the process of being assigned by the Linux Kernel CVE Numbering Authority. There are eleven patches for the nine vulnerabilities and each patch is assigned a CVE IDs: CVE-2026-23268, CVE-2026- ...