IoT in desperate need of more robust identity and access management

The future of Identity and Access Management (IAM) in the Internet of Things (IoT) will escape the confines of user-focused identity and transition toward a more inclusive model.  The new multi-faced approach will include machine and system identity along with IoT device and platform management operations, according to a new analysis research report by global tech market advisory

Read more

Build digital trust to unleash the full commercial potential of IoT

The API revolution is fuelling digital transformation across a spectrum of industries and opening the way for new IoT use cases. But capturing the full commercial potential of the IoT will depend on addressing lingering consumer concerns over consent and privacy, explains Eve Maler

Read more

Will the Internet of Things kill off passwords?

The tech goliaths Google, Apple and Facebook are all starting to take steps towards killing off password authentication once and for all. They see the opportunity to shore up security while also cutting down the number of password resets that consumers have to deal with.

Read more

Is the Internet of Things broken beyond repair?

The Internet of Things has come a long way in the five years since the first IoT Day in 2011. But, there is a darker side to its success, with thousands of high-profile hacks having been carried out on connected devices.

Read more

How to provide continuous security and protect our privacy online

In this exclusive interview with ForgeRock, VP of Emerging Technology, Eve Maler tells IoT Now what organisations can do to better protect customer information online.

Read more

ForgeRock Identity Platform addresses evolving customer data privacy regulations with ‘first-of-its-kind’ consent solution

ForgeRock® has introduced its newest identity management platform, including an implementation of the User-Managed Access (UMA) standard. Built on consent-by-default and consent-by-design principles, the ForgeRock Identity Platform™ is the first identity management platform to support an UMA implementation designed for consumer consent and data sharing purposes.

Read more

Open source: Security through transparency

The contrast between proprietary and open source software is as old as the IT industry itself. Software in almost every category is available either from suppliers who develop and market their code by themselves or from developer communities who work with open code.

Read more

Securing the IoT: Is it possible to protect billions of devices simultaneously?

To understand why there is so much excitement surrounding the Internet of Things (IoT), look no further than smart home appliances.

Read more

Future smart ‘things’ to be co-operative, emotional and lucrative, say CW speakers

The process of providing connectivity and functionality to ‘things’ no longer represents a challenge in the modern digital era.

Read more

Securing the smart city

As the vision of smart cities increasingly becomes reality, so too does the issue of security surrounding them. What can be done to ensure the security practices put in place are up to the job?

Read more

Balancing act: Why embracing the IoT doesn’t mean the end of privacy

Recent technological advances have paved the way for an era of almost limitless imagination in the way we live our lives. The Internet of Things (IoT) is the embodiment of this phenomenon.

Read more

Securing the Identity of Things (IDoT) for the Internet of Things

In its recent report, The Identity of Things (IDoT) for the Internet of Things, Gartner lays out how it believes the Internet of Things (IoT), or what is often now referred to as the Internet of Everything (IoE), cannot and will not prosper unless organisations knuckle down and come to grips with how to manage

Read more