Skip to main content
  1. Blog
  2. Article

Canonical
on 18 July 2018


Title: IoT Security at Scale: Managing end-to-end security for Commercial IoT Gateways

Speakers: Justin Rigling, CTO, Rigado

Date/Time: August 8, 12:00PM EST / 5:00PM BST

Rigado, a Canonical partner, provides a secure, scalable gateway solution to companies deploying large-scale Commercial IoT applications. In this webinar, Rigado will share their best practices for creating and managing IoT applications at thousands of locations, while maintaining end-to-end security from point of manufacture through to updates in the field. Rigado’s ‘Cascade’ infrastructure – utilising Ubuntu Core – offers a unique ‘edge-as-a-service’ solution to IoT teams that require edge connectivity and computing for applications such as asset tracking, smart buildings and sensing and monitoring.

Register for webinar

Related posts


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...


Luci Stanescu
14 May 2026

Fragnesia Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on May 13, 2026. The vulnerability does not have a CVE ID published, but is referred to as “Fragnesia.”  The vulnerability affects multiple Linux distributions, including all Ubuntu releases. The affected components are the Linux kernel ...


Luci Stanescu
8 May 2026

Dirty Frag Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

Two local privilege escalation (LPE) vulnerabilities affecting the Linux kernel have been publicly disclosed on May 7, 2026. The vulnerabilities have been assigned the IDs CVE-2026-43284 and CVE-2026-43500 and are referred to as “Dirty Frag.” The affected components are Linux kernel modules. The first vulnerability impacts the modules tha ...