-
Article
Securing IoT: Whose responsibility is it?
There's no shortage of opinions on where to place the blame for IoT security events. However, as IEEE member Kayne McGladrey explains, the onus is on both manufacturers and consumers. Read Now
-
Blog
Security remains top concern of enterprise IoT customers
A recent survey by Bain & Company found that enterprise customers still have ROI and integration concerns around their IoT systems. Read Now
-
Article
How hard-coded credentials threaten ICS security
Hard-coded credentials open industrial control systems up to unauthorized access by malicious actors and threaten ICS security. Expert Ernie Hayden explains the threat and what enterprises can do about it. Read Now
-
Article
How do you provide IoT updates to devices in the field?
As attractive targets to hackers, IoT device vulnerabilities have shown how critical -- and challenging -- it is to be able to securely provide needed software and firmware updates. Read Now
Editor's note
Security continues to be the No. 1 enterprise IoT adoption barrier, and for good reason. Half of the top 12 exploits in Fortinet's Q4 2018 "Threat Landscape Report" directly involved IoT devices. Four of these threats exploited IP cameras, a device category targeted in the fall 2016 Mirai botnet attacks, proving that many lessons that should have been learned from those attacks haven't been.
Enterprise IoT security is critical. While data breaches can damage brands and be a nuisance, attacks on connected critical infrastructure, medical devices and other IoT systems can be life-threatening.
Use this guide to get up to speed on top IoT security risks and tools that mitigate IoT security concerns.
1Build an enterprise IoT security strategy
Including IoT in an enterprise security strategy is essential to avoid the potentially damaging effects of connected devices and environments. However, IoT security has a number of caveats that IT security teams may not be familiar with. Find out who's responsible for securing IoT and get help devising an enterprise IoT security plan.
-
Article
Securing IoT: Whose responsibility is it?
There's no shortage of opinions on where to place the blame for IoT security events. However, as IEEE member Kayne McGladrey explains, the onus is on both manufacturers and consumers. Read Now
-
Blog
Security remains top concern of enterprise IoT customers
A recent survey by Bain & Company found that enterprise customers still have ROI and integration concerns around their IoT systems. Read Now
-
Article
How can connected car security issues be detected and mitigated?
IEEE senior member Alexander Wyglinski discusses why the vehicular tech industry needs to shift gears to put the brakes on connected car security threats. Read Now
-
Blog
I lost my identity at Money20/20 so you don't have to
A personal experiment in ways to verify a person's identity reveals great strides in detecting fraud using biometric, behavioral, big data and AI technologies. Read Now
-
Blog
Essential IoT compliance could change your game
C-level executives and their boards need to address the evolving liability and privacy issues related to the autonomous collection of IoT data. Read Now
2IoT security threats
From hard-coded passwords to IoT botnets to new variants of the largest IoT distributed denial-of-service attack to date, IoT security risks are top headline-makers and can do a great deal of damage against a company's reputation. However, many of these attacks and vulnerabilities are easily mitigated. Learn how.
-
Blog
The hidden dangers of IoT devices
In the rush to get IoT devices to market, manufacturers may overlook the need to implement strong security features. Learn the risks and regulatory issues that can occur. Read Now
-
Article
How hard-coded credentials threaten ICS security
Hard-coded credentials open industrial control systems up to unauthorized access by malicious actors and threaten ICS security. Expert Ernie Hayden explains the threat and what enterprises can do about it. Read Now
-
Article
Wi-Fi 6 and IoT could threaten the network
New advances in Wi-Fi technology -- like Wi-Fi 6 -- and IoT can create bottlenecks in legacy campus LANs due to increased throughput consumption and slower uplink speeds. Read Now
-
Article
New Mirai malware variant targets enterprise devices
Researchers from Palo Alto Networks have spotted a new variant of the Mirai botnet that is targeting enterprise presentation systems and digital signage with 11 new exploits. Read Now
-
Article
IoT botnets: How are new Mirai variants impacting systems?
An increase of IoT botnets has been seen since the Mirai malware source code was leaked. Learn how the new variants pose to be a serious threat to IoT devices with Michael Cobb. Read Now
3IoT security mechanisms
Securing an IoT environment requires a mix of tried-and-true security tools, such as public key infrastructure and encryption, and new technologies, including digital twins, AI and automated threat detection. Read about the various security mechanisms that can help protect your connected deployment against IoT security risks.
-
Article
How do you provide IoT updates to devices in the field?
As attractive targets to hackers, IoT device vulnerabilities have shown how critical -- and challenging -- it is to be able to securely provide needed software and firmware updates. Read Now
-
Article
Book excerpt: Building blocks of an IIoT security architecture
The following is an excerpt from 'Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries' by author Sravani Bhattacharjee and published by Packt. Read Now
-
Article
Three IoT encryption alternatives for enterprises to consider
The use of cryptography alternatives for IoT devices grants users certain benefits and potential security challenges. Learn more about each alternative with expert Judith Myerson. Read Now
-
Blog
Due diligence and compliance in IoT with digital twins and mirrors
The use of virtualized clones – also referred to as digital mirrors – can create new opportunities for hackers. Discover the three actions you can take to manage your risk. Read Now
-
Article
How do AI algorithms automate IoT threat detection?
IoT threat detection is about to get easier, thanks to the automating abilities of AI algorithms. But, as IEEE member Kayne McGladrey explains, it doesn't mean humans are out of the picture. Read Now