Heat Index

Posts Tagged ‘IoT security’

Most Recent
Read More
April 17, 2018

Securing the IoT: Assessing the requirements for an IoT security strategy

Assessing the requirements for an IoT security strategy in the business environment needs careful attention these days. With cyber threats rife and frequent reports of security breaches to businesses big and small, no one is safe, and many are not prepared.

Read More
September 18, 2017

IoT relies on five key attributes to ensure a secure foundation for services to run over

Security in IoT is a process that relies on continuous security across five key dimensions of an IoT service. These five attributes are Secure Boot, Secure Firmware over the Air, Secure Physical Interface and APIs, Secure Physical Transport Layer and Robustness. Here, Mats Andersson, the senior director of technology for short range wireless at u-blox, explains to Robin Duke-Woolley, the [...]

Read More
August 22, 2017

Does securing IoT sensors make you WannaCry?

Mention IoT security to most people in the industry these days and they’re sure to make reference to the recent WannaCry ransomware attack which hit major industrial enterprises and public bodies worldwide. The malware exploited vulnerabilities in instances of Windows operating systems which were either no longer supported or unpatched, and while such weaknesses are potential threats to [...]

Read More
July 31, 2017

Edge computing powers devices to process before transmission

Mike Bell is the executive vice president of IoT & Devices at Canonical. He joined the company in October 2016 from car maker Jaguar Land Rover’s connected car and in-car entertainment business. This background gives him great familiarity with embedded devices as Canonical focuses its IoT and devices efforts on the mobility, industrial, networking and digital signage sectors with its [...]

Read More
June 12, 2017

Skip the scary stories and focus on what you need to secure in manufacturing IoT

Security issues in the connected and PC-dominated world are nothing new. With thousands of IoT devices connected every year, companies and security providers have increased their  understanding of how to deal with new threats.

Read More
May 31, 2017

A new formula for IoT security is risk equals probability multiplied by loss

The climate of fear surrounding IoT security suggests that it is different to standard IT or internet security but in reality, the fundamentals of securing things are no different to securing servers or personal data. What is different, though, finds George Malim is that in IoT the stakes in terms of the potential damage security breaches can cause are often raised.

Read More
May 16, 2017

IoT needs security by design… not as an afterthought

Syed Hosain is the chief technology officer of Aeris, a technology provider and a cellular network operator that delivers comprehensive IoT and M2M services to leading brands. As IoT matures and scales up, it’s clear that the security issues that afflict the wider internet are also present in IoT but they are also accompanied by numerous device, hardware, software and application [...]

Read More
July 11, 2016

Infotecs enables the IoT: showcase their high-security solutions at Security of Things World in Berlin

The high-security provider Infotecs showcased IoT Security Enablement with its ability to provide secure connectivity from any device at the event Security of Things World in Berlin, 27-28th June 2016.

Read More
June 30, 2016

Monetising IoT conference to tackle security and big data challenges and support IoT for enterprise

The Monetising Internet of Things event series has announced its Copenhagen conference program and initial speaker line-up.

Read More
June 17, 2016

Most IT professionals ‘unaware’ of how to secure IoT devices on their networks, says ForeScout survey

ForeScout® Technologies, Inc. has announced the findings of its new “Enterprise Internet of Things (IoT) Survey”.



Read More


Partnering is the key to move IoT beyond connectivity. Interview with GSMA

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.