Internet of things security
Internet of things security includes comprehensive resources about identity and access management for IoT, attack vectors and mitigations, intellectual property protection and threat prevention and defense.
Top Stories
-
Tip
18 Nov 2024
What CISOs need to know to build an OT cybersecurity program
More companies are tasking CISOs with operational technology security. But this oversight means a new strategy for those unfamiliar with building an effective OT security program. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Sharon Shea, Executive Editor
-
Tip
04 Apr 2024
5 top OT threats and security challenges
Securing operational technology is particularly critical but also especially challenging. Consider these top OT threats and how to manage them. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Blog Post
06 May 2019
Due diligence and compliance in IoT with digital twins and mirrors
As digital twins and mirrored worlds become more commonplace, security managers must consider the risks associated with these virtualized clones. EmeSec's Maria Horton offers best practices for ... Continue Reading
By- Maria C. Horton, EmeSec Incorporated
-
Blog Post
02 May 2019
Can California legislation save the world from IoT security risks?
IoT security legislation introduced in California aims to provide 'reasonable' security mechanisms to mitigate threats, such as default passwords. But is it enough? NSFOCUS' Guy Rosefelt discusses. Continue Reading
By- Guy Rosefelt, NSFOCUS
-
Blog Post
01 May 2019
Beyond SB-327: Moving toward true IoT security
While California's CCPA and SB-327 are making strides toward a safer IoT ecosystem, StrongKey's Arshad Noor explains why it's also important to adopt a passwordless method of securing IoT. Continue Reading
By- Arshad Noor, StrongKey Inc.
-
Blog Post
26 Apr 2019
How IoT affects police investigations
The internet of things can provide critical insight for police investigations. Hyperlink InfoSystem's Harnil Oza explains how, as well as the role businesses must play to ensure successful ... Continue Reading
By- Harnil Oza, Hyperlink InfoSystem
-
Blog Post
23 Apr 2019
The top 3 IoMT challenges keeping healthcare IT up at night
IoT technology is being deployed in life-critical situations, placing added pressure on health IT teams to mitigate new risks. Extreme Networks' Mike Leibovitz outlines the top three risks of IoMT ... Continue Reading
By- Mike Leibovitz, Extreme Networks
-
Blog Post
22 Apr 2019
Top 5 proactive solutions to IoT security challenges
IoT devices are easy to hack and enterprises often have no visibility into what these devices do or access. Portnox's Ofer Amitai offers five solutions to prevent IoT security challenges in the future. Continue Reading
By- Ofer Amitai, Portnox
-
Answer
18 Apr 2019
How can connected car security issues be detected and mitigated?
IEEE senior member Alexander Wyglinski discusses why the vehicular tech industry needs to shift gears to put the brakes on connected car security threats. Continue Reading
By -
Blog Post
15 Apr 2019
Securing the IoT edge
IoT security requires a consistent and comprehensive security strategy. Fortinet's John Maddison discusses five crucial elements of IoT edge security and explains how, tied together, they build a ... Continue Reading
By- John Maddison, Fortinet
-
Blog Post
09 Apr 2019
Today's PKI is purpose-built and ready for IoT
Many attacks on IoT environments take advantage of weak authentication and encryption. Sectigo's Jason Soroko explains why PKI is integral in creating a chain of trust that is extremely difficult ... Continue Reading
By- Jason Soroko, Sectigo
-
Blog Post
08 Apr 2019
Protecting the exploding attack surface: A blueprint for government agencies
To protect the ever-expanding attack surface caused by IoT and cloud, Lumeta at Firemon's Reggie Best suggests government agencies adopt cyber-situational awareness in tandem with intent-based ... Continue Reading
By- Reggie Best, Lumeta Solutions at FireMon
-
Blog Post
04 Apr 2019
Securing the 'M' in IoMT to ensure patient safety
Connected medical devices cannot be secured properly by traditional IT security systems or even generic IoT cybersecurity approaches. Cynerio's Leon Lerman discusses why an extra level of ... Continue Reading
By- Leon Lerman, Cynerio
-
Blog Post
29 Mar 2019
Investing wisely in digital security measures
Device security isn't a new topic, but with the growing number of IoT devices, it is one that needs to be revisited. Keyfactor's Kevin von Keyserling explains why finding dollars for digital ... Continue Reading
By- Kevin von Keyserling, Keyfactor
-
Blog Post
28 Mar 2019
The new standard for IoT security
When adopting a wireless sensor network to accommodate IoT, it is critical to also adopt a proper IoT data security strategy. Very Good Security's Mahmoud Abdelkader explains what to look for. Continue Reading
By- Mahmoud Abdelkader, Very Good Security (VGS)
-
Blog Post
27 Mar 2019
IoT security: Decisive action is needed
As IoT adoption soars, so too does the potential for security vulnerabilities. Will the government step in with IoT security regulations? Canonical's Eric Jensen discusses why action must be taken ... Continue Reading
By- Eric Jensen, Canonical - the company behind Ubuntu
-
Blog Post
26 Mar 2019
Prioritizing the IoT device's security posture in 2019
Testing is a critical component of securing IoT devices. Spirent's Stephen Douglas offers three simple rules to starting enterprise IoT device testing and explores why a holistic approach is key. Continue Reading
By- Stephen Douglas, Spirent
-
Tip
22 Mar 2019
Best practices to overcome an IoT security challenge
The internet of things poses numerous security challenges, but with the proper preparation and tools, your enterprise can mitigate the threats. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Blog Post
20 Mar 2019
Why are connected device risks more inherent with APIs?
A number of consumer and enterprise IoT devices use APIs to support users across the world. However, these APIs present a number of risks. Threat X's Andrew Useckas explains the inherent threats ... Continue Reading
By- Andrew Useckas, Threat X
-
Blog Post
19 Mar 2019
The case for an internet code of conduct
As consumers and enterprises adopt more IoT devices and sensors, should they have to waive expectations of privacy? Qorvo's Cees Links explains why a code of conduct for the internet is so important. Continue Reading
By- Cees Links, Qorvo
-
Blog Post
14 Mar 2019
Security remains top concern of enterprise IoT customers
A recent survey found that customers' worries about IoT deployments remain the same as years past: security, integration and ROI. Bain & Company's Ann Bosche explains. Continue Reading
By- Ann Bosche, Bain & Company
-
Blog Post
12 Mar 2019
Can we ensure consumer IoT privacy while enabling the data marketplace?
IoT data marketplaces could unlock trillions of dollars in value for companies, but doing so while keeping data privacy in mind is critical. ForgeRock's Ashley Stevenson discusses how to build IoT ... Continue Reading
By- Ashley Stevenson, ForgeRock
-
Blog Post
08 Mar 2019
Will the new EU standard protect consumers from IoT products?
ETSI's recently release TS 103 645 aims to protect consumers from security dangers inherent to IoT devices. Northern.tech's Thomas Ryd discusses the requirements in the standard and what to expect. Continue Reading
By- Thomas Ryd, Northern.tech
-
Blog Post
07 Mar 2019
The hidden dangers of IoT devices
As the number of IoT devices increases, so too does the number of security threats users face. Richard van Hooijdonk discusses the IoT threats, how governments are stepping in and steps users and ... Continue Reading
By- Richard van Hooijdonk, Richard van Hooijdonk Holding
-
Blog Post
05 Mar 2019
Combatting the continued expansion of IoT threats
IoT threats have topped the Fortinet Threat Landscape Report for the past year. FortiGuard Labs' Anthony Giandomenico offers insights into the fundamental shifts organizations must take with IoT ... Continue Reading
By- Anthony Giandomenico, Fortinet
-
Feature
04 Mar 2019
Book excerpt: Building blocks of an IIoT security architecture
The following is an excerpt from 'Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries' by author Sravani Bhattacharjee and published by Packt. Continue Reading
By- Sravani Bhattacharjee, IrecaMedia
-
Blog Post
04 Mar 2019
Five IoT security and privacy trends to look out for in 2019
While the internet of things may be proven technology now, its security is only getting more difficult. Very Good Security's Peter Berg offers five IoT security trends to look out for in the year ... Continue Reading
By- Peter Berg, Very Good Security
-
Blog Post
04 Mar 2019
Achieving IoT, cloud and edge security starts with visibility
Maintaining edge security in an IoT or IIoT network is more challenging than securing an IT network. Lumeta at Firemon's Reggie Best discusses starting with visibility is critical to achieving IoT ... Continue Reading
By- Reggie Best, Lumeta Solutions at FireMon
-
Answer
25 Feb 2019
Securing IoT: Whose responsibility is it?
There's no shortage of opinions on where to place the blame for IoT security events. However, as IEEE member Kayne McGladrey explains, the onus is on both manufacturers and consumers. Continue Reading
By- Kayne McGladrey, IEEE
-
Blog Post
25 Feb 2019
Overcome the cybersecurity skills gap to embrace the digital transformation power of IoT
Securing IoT is critical, but with a major security skills shortage, recruiting talent is challenging to say the least. Fortinet's Jonathan Nguyen-Duy offers insight into finding – or cultivating – ... Continue Reading
By- Jonathan Nguyen-Duy, Fortinet
-
Tip
25 Feb 2019
With an IoT digital twin, security cannot be forgotten
While digital twins can improve the security of IoT devices and processes, it is critical to consider the security of the twins themselves when implementing one. Continue Reading
By -
Blog Post
21 Feb 2019
Identity and access management is a top IoT security concern
One of the biggest concerns in an IoT ecosystem is identity and access management – not just of humans, but also devices and applications. Ericsson's Bodil Josefsson offers key factors to consider ... Continue Reading
By- Bodil Josefsson, Ericsson
-
Blog Post
20 Feb 2019
Strong security can unleash the promise of the industrial internet of things
Industrial IoT is set to make a worldwide economic impact. However, without strong security, IIoT efforts are for naught. DigiCert's Dan Timpson explains why PKI and digital certificates are key to ... Continue Reading
By- Dan Timpson, DigiCert
-
Blog Post
19 Feb 2019
How to manage IIoT authentication and protect machine identities
To monitor and manage the data communications of authenticated remote IIoT devices, implementing enterprise-grade virtual private networks is critical. NCP Engineering's Julian Weinberger discusses. Continue Reading
By- Julian Weinberger, NCP engineering
-
Blog Post
05 Feb 2019
Smart biometric template storage often requires a hybrid approach
The use of biometrics for authentication and identification will only grow, but keeping that personally identifiable data safe is another challenge. SensibleVision's George Brostoff explains how a ... Continue Reading
By- George Brostoff, SensibleVision
-
Blog Post
05 Feb 2019
Securing IoT edge infrastructure and mitigating risk
Securing IoT edge infrastructure requires careful planning and execution. Rigado's Justin Rigling outlines the threats to look for at the IoT edge and measures to take to mitigate those threats. Continue Reading
By- Justin Rigling, Rigado
-
Blog Post
04 Feb 2019
IoT security trends to watch in 2019
The IoT market will continue to grow over the next year, as will the number of IoT security threats connected environments will face. Kudelski Security's Andrew Howard discusses the threats and the ... Continue Reading
By- Andrew Howard, Kudelski Security
-
Blog Post
30 Jan 2019
Can IoT and blockchain work together?
The interaction between the all-encompassing IoT and blockchain has been the subject of much debate. BairesDev's Nacho De Marco takes a look at how the two interact. Continue Reading
By- Nacho De Marco, BairesDev
-
Feature
28 Jan 2019
IoT identity management eyes PKI as de facto credential
Public key infrastructure is emerging as the essential technology for identity management in IoT, as customers seek out a trifecta of data integrity, authentication and encryption. Continue Reading
-
Blog Post
28 Jan 2019
Navigating the IoT security minefield: API security
The growth of IoT and subsequent rise of API adoption presents a number of security challenges to enterprises. Threat X's Andrew Useckas offers five tips for designing, building and connecting ... Continue Reading
By- Andrew Useckas, Threat X
-
Answer
25 Jan 2019
How can a security automation tool help mitigate unknown threats?
Security automation tools help ease the deluge of alerts security teams receive, according to IEEE member Kayne McGladrey, letting them focus on more interesting aspects of IT security. Continue Reading
By- Kayne McGladrey, IEEE
-
Blog Post
23 Jan 2019
Is IoT getting more secure?
New survey data is showing some promising signs when it comes to IoT security, but there's still a long way to go. Gemalto's Gorav Arora outlines how IoT security is improving, where the government ... Continue Reading
By- Gorav Arora, Gemalto
-
Blog Post
21 Jan 2019
Cellular technology can improve IoT security
The importance of securing connected devices and ensuring the privacy of the IoT data they transmit is clear. Telnyx's David Casem explains how the inherent security built into cellular ... Continue Reading
By- David Casem, Telnyx
-
Blog Post
17 Jan 2019
Taking back network control in the IoT era
IoT security isn't something to worry about later – it's here today. Lumeta's Reggie Best outlines three best practices which, combined with specialized network visibility technologies, can help ... Continue Reading
By- Reggie Best, Lumeta Solutions at FireMon
-
Blog Post
11 Jan 2019
Looking ahead: Security implications of 5G and IoT
The impact of 5G and IoT on business and networking strategies will be transformational. Yet, as Fortinet's Jonathan Nguyen-Duy explains, there are important security considerations 5G and edge ... Continue Reading
By- Jonathan Nguyen-Duy, Fortinet
-
Answer
09 Jan 2019
How do AI algorithms automate IoT threat detection?
IoT threat detection is about to get easier, thanks to the automating abilities of AI algorithms. But, as IEEE member Kayne McGladrey explains, it doesn't mean humans are out of the picture. Continue Reading
By- Kayne McGladrey, IEEE
-
Blog Post
04 Jan 2019
The manifold dangers of IoT devices and their foreign platforms
Pepper IoT's Scott Ford offers insights into how smart homes spy on their users – as well as why retailers and manufacturers are key to mitigating the danger. Continue Reading
By -
Blog Post
03 Jan 2019
Bridge the gap between security and IT to support an overall IoT strategy
Security and IT teams should work together to build an overall IoT strategy, one that can move beyond its preliminary purpose to benefit many facets of a company. Pivot3's Brandon Reich discusses. Continue Reading
By- Brandon Reich, Pivot3
-
Blog Post
17 Dec 2018
Secure by design: Creating IoT devices with a focus on digital security
Security for IoT should not be an add-on, luxury or choice -- and it certainly isn't something that should be revisited after the device has been deployed. Keyfactor's Kevin von Keyserling offers ... Continue Reading
By- Kevin von Keyserling, Keyfactor
-
Feature
17 Dec 2018
How do you provide IoT updates to devices in the field?
As attractive targets to hackers, IoT device vulnerabilities have shown how critical -- and challenging -- it is to be able to securely provide needed software and firmware updates. Continue Reading
-
Blog Post
11 Dec 2018
IoT cybersecurity: A major concern for agriculture
While IoT offers incredible opportunities for the agricultural industry, IoT cybersecurity in agriculture is seriously neglected. Karina Popova discusses the risk and why action needs to be taken now. Continue Reading
By- Karina Popova, LINK Mobility GmbH
-
Blog Post
11 Dec 2018
Mitigating IoT security risks through the use of deception technology
As more and more internet-enabled devices enter the scene, it's no surprise that threat actors are developing ways to exploit them. Attivo's Carolyn Crandall explains how deception technology can ... Continue Reading
By- Carolyn Crandall, Attivo Networks
-
Blog Post
04 Dec 2018
New IoT security laws and proposals are a good start, but we need to do more
While new IoT security laws and proposals are a step in the right direction toward securing IoT, there is a lot more to be done to ensure a safe connected environment, says GlobalSign's Nisarg Desai. Continue Reading
By- Nisarg Desai, GlobalSign
-
Blog Post
30 Nov 2018
Addressing security at the edge
The physical and digital aspects of edge computing require additional security strategies. Stratus Technologies' Jason Andersen offers three questions to determine your company's level of security ... Continue Reading
By- Jason Andersen, Stratus Technologies
-
Blog Post
30 Nov 2018
Navigating the IoT security minefield: Securing device-to-cloud flows
Another month, another IoT security flaw. Threat X's Andrew Useckas explains the vulnerability in the MiSafes child-tracking smartwatch and explores how TPM and the proper cryptography could have ... Continue Reading
By- Andrew Useckas, Threat X
-
Blog Post
28 Nov 2018
Machine learning is transforming brand protection
Counterfeit products and gray market imports stem from a lack of supply chain visibility. EVRYTHNG's Niall Murphy explains how mass-scale product digitization coupled with machine learning can ... Continue Reading
By- Niall Murphy, EVRYTHNG
-
Blog Post
19 Nov 2018
IoT and security: Using your network to become an IT disruptor
Masergy's Terry Traina outlines three steps to help organizations overcome IoT security challenges and become and IoT disruptor to take advantage of all the benefits a connected enterprise has to ... Continue Reading
By- Terry Traina, Masergy
-
Blog Post
19 Nov 2018
Reimagining the IIoT revolution through built-in security
The IIoT revolution promises a myriad of benefits, yet an insecure OT environment can result in lost money -- or even loss of life. Mocana's William Diotte discusses why built-in IIoT security is ... Continue Reading
By- William Diotte, Mocana Corporation
-
Blog Post
16 Nov 2018
IoT can create serious security vulnerabilities, so what should you do?
IoT security is no joke; even the most innocuous connected device can threaten the entire network. Thales eSecurity's John Grimm discusses the risks and how PKI can help address them. Continue Reading
By- John Grimm, Thales eSecurity
-
Blog Post
16 Nov 2018
2019: Getting serious about IIoT security
As 2018 draws to a close, it's critical to make one major resolution for 2019: IIoT security. Greenwave Systems' Leon Hounshell discusses IIoT threats and why there is hope on the horizon for a ... Continue Reading
By- Leon Hounshell, Greenwave Systems
-
Blog Post
15 Nov 2018
Addressing the issue of product liability in a connected world
The onus of IoT liability and risk is often laid on device manufacturers, yet there are implications for those creating the applications and services as part of that product. Netscout's Ron Lifton ... Continue Reading
By- Ron Lifton, NETSCOUT Systems
-
Blog Post
15 Nov 2018
I lost my identity at Money20/20 so you don't have to
Living in Digital Times' Robin Raskin subjected herself to numerous identity verification systems at Money20/20. Get her take on biometrics, big data and AI for identity management, from iris scans ... Continue Reading
By- Robin Raskin, Living in Digital Times
-
Blog Post
15 Nov 2018
Mobile and IoT threats during the holiday season
As the holiday season approaches, it is critical for retailers and others offering connectivity to customers to be aware of IoT security threats and how to prevent them. FortiGuard Labs' Anthony ... Continue Reading
By- Anthony Giandomenico, Fortinet
-
Blog Post
13 Nov 2018
Securing the fourth Industrial Revolution: A shared responsibility
Since many IoT devices are resource-constrained, securing them can be a challenge. Kudelski Security's Andrew Howard discusses why a shared responsibility security model is critical. Continue Reading
By- Andrew Howard, Kudelski Security
-
Blog Post
12 Nov 2018
Steps carmakers need to make to secure connected car data
High Mobility's Kevin Valdek discusses what carmakers need to do in order to handle the ever-increasing number of consumer concerns about data privacy in connected vehicles. Continue Reading
By- Kevin Valdek, High Mobility
-
Blog Post
08 Nov 2018
California's new IoT security law: Inching toward a safer future
As the government begins to take action for IoT security, California's SB 327 sets the stage to ensure reasonable security measures are taken by IoT device manufacturers. Sectigo's Damon Kachur ... Continue Reading
By- Damon Kachur, Sectigo
-
Blog Post
02 Nov 2018
Why security is the key to emerging technology -- and vice versa
Securing emerging tech, such as IoT, drones and smart city deployments, is critical yet not always easy. Tata Communications' Srinivasan CR explains how adding new security tech, including ... Continue Reading
By- Srinivasan CR, Tata Communications
-
Blog Post
29 Oct 2018
Don't overlook IoT this National Cybersecurity Awareness Month
IoT cybersecurity precautions should be taken year-round. MobileIron's Ojas Rege explains the risks of IoT devices in the enterprise and discusses how to prepare for the future IoT-enabled office. Continue Reading
By- Ojas Rege, MobileIron
-
Blog Post
25 Oct 2018
Navigating the IoT security minefield: The cloud portal
Threat X's Andrew Useckas offers best practices that need to be followed in order to build a secure centralized IoT management portal. Continue Reading
By- Andrew Useckas, Threat X
-
Blog Post
24 Oct 2018
IoT: Synonymous with poor security?
IoT is infiltrating our personal and professional lives. While it brings many benefits, says Marlabs' Saugat Bose, without the proper security it leaves homes and businesses open to attack. Continue Reading
By- Saugat Bose, Marlabs Inc.
-
Blog Post
15 Oct 2018
4 spooky internet of things goblins and how to outsmart them
By delaying IoT adoption, says Cisco's Maciej Kranz, enterprises risk losing out on the transformation potential of the internet of things. Here, he outlines four of the scariest IoT goblins, as ... Continue Reading
By- Maciej Kranz, Cisco
-
Blog Post
12 Oct 2018
For smarter buildings, we need to bridge the IT-facilities divide
To get the most from IoT projects, we need to bridge the IT-facilities divide. ServiceChannel's Hugues Meyrath explains why and offers tips to help bring IT and facilities together. Continue Reading
By- Hugues Meyrath, ServiceChannel
-
Blog Post
11 Oct 2018
Industry 4.0: Where the U.S. and EU could lose
A recent PwC report find 20% of companies adopting bleeding-edge IoT technology are in APAC -- why are the U.S. and EU falling short? Nozomi Networks' Andrea Carcano takes a look. Continue Reading
By- Andrea Carcano, Nozomi Networks
-
Blog Post
11 Oct 2018
Securing industrial intelligence against attacks
Cybersecurity for IIoT devices is still very much in the early development stages. NCP engineering's Julian Weinberger discusses the IoT threats on ICSes and offers tips to ensure ICS security. Continue Reading
By- Julian Weinberger, NCP engineering
-
Blog Post
05 Oct 2018
5 lessons IoHT can learn from the tech world
Healthcare is seeing some of the greatest impact from IoT, creating a new category of connected health devices. VivaLNK's Jiang Li outlines five lessons IoT in healthcare can learn from the broader ... Continue Reading
By- Jiang Li, VivaLNK
-
Blog Post
03 Oct 2018
Protecting the internet of things
Cyberattacks targeting IoT devices are on the rise. To combat the threat, says Equinix's Chiaren Cushing, it is an interconnection-oriented architecture and centralized data encryption strategy is ... Continue Reading
By- Chiaren Cushing, Equinix
-
Blog Post
02 Oct 2018
IoT innovation brings complexity and risk: Learning from past mistakes
To secure IoT in the future, it is critical to learn from past IoT security mistakes. Comodo CA's Damon Kachur describes the kill chain for most cyberattacks and offerings insight into preventing ... Continue Reading
By- Damon Kachur, Sectigo
-
Blog Post
28 Sep 2018
Securing IIoT requires extra care. NAC and segmentation can help
Converging IT and OT networks naturally exposes critical devices and processes to new threats. Fortinet's Peter Newton outlines how NAC and segmentation can help sure IIoT. Continue Reading
By- Peter Newton, Fortinet
-
Blog Post
18 Sep 2018
Navigating the IoT security minefield: Hardware security
In our hyperconnected world, organizations now need to look at hardware security through a different lens. Here, Threat X's Andrew Useckas explains how to ensure the security of IoT devices. Continue Reading
By- Andrew Useckas, Threat X
-
Blog Post
17 Sep 2018
What people are getting wrong about IoT: 10 industry experts weigh in
Misconceptions around IoT abound. Canonical's Tom Canning asked 10 industry experts what they thought people were getting wrong about IoT. Find out what they said. Continue Reading
By- Tom Canning, Canonical
-
Blog Post
17 Sep 2018
What businesses need to know about the future of IoT
The internet of things may finally be ready to live up to its hype. Mondo's Stephen Zafarino outlines three business predictions for the future of IoT and how to prepare your organization for a ... Continue Reading
By- Stephen Zafarino, Mondo
-
Blog Post
14 Sep 2018
A smart approach to monetizing IoT
By offering value-add services, such as business consulting, systems integration, analytics and security, it's possible for operators to dramatically increase their stake in IoT. Netscout's Ron ... Continue Reading
By- Ron Lifton, NETSCOUT Systems
-
Blog Post
13 Sep 2018
Blockchain offers a new approach to customer satisfaction with the help of IoT
Pairing blockchain with IoT is revolutionizing the customer experience, says Voxpro's Brian Hannon, namely by providing the trust needed to build customer relationships on core values of security, ... Continue Reading
By- Brian Hannon, Voxpro - powered by TELUS International
-
Blog Post
12 Sep 2018
Speck finding its place in the internet of things
Cryptography is critical to security, yet IoT devices often do not have the computational capability to handle algorithms such as AES. Intertrust's Bill Horne explains how Speck, a lightweight ... Continue Reading
By- Bill Horne, Intertrust
-
Blog Post
07 Sep 2018
IoT security at Black Hat 2018: The insecurity of things
While attending Black Hat 2018, Portnox's Ofer Amitai saw a number of IoT hack demonstrations firsthand. Fortunately, IoT security doesn't have to be this way. Continue Reading
By- Ofer Amitai, Portnox
-
Blog Post
07 Sep 2018
The unlikelihood of 'IoT, secure by design,' and what we can do about it
The 'secure by design' concept is a great idea in theory, but without automatic updates, IoT security will always be an issue. Minim's Alec Rooney discusses. Continue Reading
By- Alec Rooney, Minim
-
Blog Post
04 Sep 2018
How loT is influencing a new cybersecurity era
The rise in IoT cybersecurity must match the explosive growth rates for IoT devices. And as Secure Channel's Richard Blech explains, manufacturers have a key role to play in ensuring IoT security. Continue Reading
By- Richard J. Blech, Secure Channels Inc.
-
Blog Post
31 Aug 2018
Cryptojacking infections are coming from inside your home
Cybercriminals have a new target: IoT devices. FortiGuard Labs' Anthony Giandomenico discusses why IoT and smart home devices are vulnerable to cryptojacking infections and offers pointers to help ... Continue Reading
By- Anthony Giandomenico, Fortinet
-
Blog Post
29 Aug 2018
Is facial recognition the killer app for AI?
Facial recognition from security camera images and videos is used to identify people, but it can be biased and cause privacy concerns. IoTDisruptions.com's Sudha Jamthe discusses. Continue Reading
By- Sudha Jamthe, IoTDisruptions.com
-
Blog Post
28 Aug 2018
Internet of threats: Managing risk and governing it
Huge strides toward addressing the ever-increasing need for IoT security regulation in the U.S. and globally have been taken over the past few months. Portnox's Ofer Amitai offers insight into ... Continue Reading
By- Ofer Amitai, Portnox
-
Blog Post
20 Aug 2018
The military strategy behind cyberattacks and how they're designed
Taking down connected infrastructure can be devastating. Deepak Puri outlines why connected infrastructure is a target and discusses why cyberdefenses needs to be strengthened. Continue Reading
By -
Blog Post
15 Aug 2018
IoT security watch: Data breach legislation is coming, first stop California
New and proposed data breach legislation in the EU and California should force organizations to reevaluate their IoT security and privacy models, says Insignary's TJ Kang. Continue Reading
By- Tae-Jin (TJ) Kang, Insignary
-
Blog Post
09 Aug 2018
IoT ripe for SegmentSmack Linux kernel security vulnerability
SegmentSmack, a new vulnerability found in the Linux kernel, poses a major risk for IoT devices. Insignary's TJ Kang explores how to find vulnerabilities in IoT code and firmware, as well as how to ... Continue Reading
By- Tae-Jin (TJ) Kang, Insignary
-
Blog Post
08 Aug 2018
Top 5 challenges of navigating the IoT security minefield
Threat X's Andrew Useckas narrows down the top five security challenges IoT vendors face today and explains and IoT-enabled enterprise is like navigating a minefield. Continue Reading
By- Andrew Useckas, Threat X
-
Blog Post
02 Aug 2018
Face recognition: Real 3D versus academic 2D
Face recognition is a powerful emerging technology with great potential -- if the value is accurately presented to the public. SensibleVision's George Brostoff sets the story straight. Continue Reading
By- George Brostoff, SensibleVision
-
Blog Post
02 Aug 2018
Can security keep pace with the rise of the machines?
If we want security measures to keep pace as more and more machines come into existence, we need to be able to reliably determine which machines should be trusted. Gemalto's Gorav Arora discusses. Continue Reading
By- Gorav Arora, Gemalto
-
Blog Post
01 Aug 2018
Risky business? How to manage IoT security in the enterprise
LeanIX's André Christ outlines six steps organizations can follow to successfully manage IoT security and assess IoT risk in the enterprise. Continue Reading
By- André Christ, LeanIX
-
Blog Post
30 Jul 2018
The importance of securing the internet of things
Securing IoT devices is difficult -- yet critical. Tata Communications' Tim Sherwood explores the challenges and offers pointers to ensure IoT security. Continue Reading
By- Tim Sherwood, Tata Communications
-
Blog Post
27 Jul 2018
Managing IoT resources with access control
While IoT devices play a crucial role in helping organizations compete in today's digital marketplace, without the proper security and access control, says Fortinet's Peter Newton, they present a ... Continue Reading
By- Peter Newton, Fortinet
-
Blog Post
18 Jul 2018
New business models with the intersection of IoT, AI and blockchain
Have you ever thought about making money with IoT, AI or blockchain? What about if you combine all three in a new business model? OIES Consulting's Francisco Maroto discusses. Continue Reading
By- Francisco Maroto, OIES Consulting
-
Blog Post
17 Jul 2018
How can anomalous IoT device activity be detected?
We cannot rely on device manufacturers to provide the security needed for personal and enterprise IoT use; it's up to IT teams to put the proper security measures in place. Zvelo's Louis Creager ... Continue Reading
By- Louis Creager, zvelo
-
News
11 Jul 2018
Execs: Content management in the cloud not as easy as it looks
Challenges await companies as they move content and microservices app-enabled processes to the cloud. Chief among them are data security and apprehension about process complexity. Continue Reading
By- Don Fluckinger, Senior News Writer