IoT security
Getting on top of the home worker IoT security challenge
As the lines between work and home environments continue to fade away, so does the separation between corporate and personal connected devices. This is exposing new cybersecurity challenges that will require a coordinated response from everyone including home workers says Greg Day, VP and CSO EMEA, Palo Alto Networks.
Read moreMWC Keynote 4: Robust IoT security at scale: setting the standard with IoT SAFE
Watch this keynote from MWC, featuring Kigen’s Paul Bradley. Discover what the industry should do to simplify path to secure cloud services.
Read moreThe 5 main considerations in ensuring IoT security for your business
With an estimated 200 billion IoT devices deployed by 2020, the age of the Internet of Things (IoT) is upon us. However, it’s important to realise just how precarious IoT security is for businesses in the current landscape. Computers, phones, tablets and any other smart devices, such as digital assistants, can be a point of
Read moreHow IoT security translates from buzzword to opportunity
More and more companies looking for turnkey managed solutions for their IoT technologies, to not only secure their applications but also comply with data security regulations, says Adam Weinberg, co-founder & CTO, FirstPoint Mobile Guard.
Read moreIoT Security Foundation launches co-ordinated vulnerability disclosure platform for industry
An online platform designed to help Internet of Things (IoT) vendors receive, assess, manage and mitigate vulnerability reports has been launched by the IoT Security Foundation (IoTSF). VulnerableThings.com aims to simplify the reporting and management of vulnerabilities whilst helping IoT vendors comply with new consumer IoT security standards and regulations.
Read moreIoT Security through the Intersection of Intelligence & Connectivity
NEW! Webinar online 31st March | 3pm UK Join us on a webinar with George Malim, Chris Francosky, Marco Bijvelds and James Moar where we provide strategies for incorporating security by design at the outset of a project, deliver insights for architecting a security framework that safeguards all layers of the IoT stack, and discuss
Read moreSecuring the IoT: Assessing the requirements for an IoT security strategy
Assessing the requirements for an IoT security strategy in the business environment needs careful attention these days. With cyber threats rife and frequent reports of security breaches to businesses big and small, no one is safe, and many are not prepared.
Read moreIoT relies on five key attributes to ensure a secure foundation for services to run over
Security in IoT is a process that relies on continuous security across five key dimensions of an IoT service. These five attributes are Secure Boot, Secure Firmware over the Air, Secure Physical Interface and APIs, Secure Physical Transport Layer and Robustness. Here, Mats Andersson, the senior director of technology for short range wireless at u-blox,
Read moreDoes securing IoT sensors make you WannaCry?
Mention IoT security to most people in the industry these days and they’re sure to make reference to the recent WannaCry ransomware attack which hit major industrial enterprises and public bodies worldwide. The malware exploited vulnerabilities in instances of Windows operating systems which were either no longer supported or unpatched, and while such weaknesses are
Read moreEdge computing powers devices to process before transmission
Mike Bell is the executive vice president of IoT & Devices at Canonical. He joined the company in October 2016 from car maker Jaguar Land Rover’s connected car and in-car entertainment business. This background gives him great familiarity with embedded devices as Canonical focuses its IoT and devices efforts on the mobility, industrial, networking and
Read moreSkip the scary stories and focus on what you need to secure in manufacturing IoT
Security issues in the connected and PC-dominated world are nothing new. With thousands of IoT devices connected every year, companies and security providers have increased their understanding of how to deal with new threats.
Read moreA new formula for IoT security is risk equals probability multiplied by loss
The climate of fear surrounding IoT security suggests that it is different to standard IT or internet security but in reality, the fundamentals of securing things are no different to securing servers or personal data. What is different, though, finds George Malim is that in IoT the stakes in terms of the potential damage security
Read moreIoT needs security by design… not as an afterthought
Syed Hosain is the chief technology officer of Aeris, a technology provider and a cellular network operator that delivers comprehensive IoT and M2M services to leading brands. As IoT matures and scales up, it’s clear that the security issues that afflict the wider internet are also present in IoT but they are also accompanied by
Read moreInfotecs enables the IoT: showcase their high-security solutions at Security of Things World in Berlin
The high-security provider Infotecs showcased IoT Security Enablement with its ability to provide secure connectivity from any device at the event Security of Things World in Berlin, 27-28th June 2016.
Read moreMonetising IoT conference to tackle security and big data challenges and support IoT for enterprise
The Monetising Internet of Things event series has announced its Copenhagen conference program and initial speaker line-up.
Read moreMost IT professionals ‘unaware’ of how to secure IoT devices on their networks, says ForeScout survey
ForeScout® Technologies, Inc. has announced the findings of its new “Enterprise Internet of Things (IoT) Survey”.
Read more