Getting on top of the home worker IoT security challenge

As the lines between work and home environments continue to fade away, so does the separation between corporate and personal connected devices. This is exposing new cybersecurity challenges that will require a coordinated response from everyone including home workers says Greg Day, VP and CSO EMEA, Palo Alto Networks.

Read more

MWC Keynote 4: Robust IoT security at scale: setting the standard with IoT SAFE

Watch this keynote from MWC, featuring Kigen’s Paul Bradley. Discover what the industry should do to simplify path to secure cloud services.

Read more

The 5 main considerations in ensuring IoT security for your business

With an estimated 200 billion IoT devices deployed by 2020, the age of the Internet of Things (IoT) is upon us. However, it’s important to realise just how precarious IoT security is for businesses in the current landscape. Computers, phones, tablets and any other smart devices, such as digital assistants, can be a point of

Read more

How IoT security translates from buzzword to opportunity

More and more companies looking for turnkey managed solutions for their IoT technologies, to not only secure their applications but also comply with data security regulations, says Adam Weinberg, co-founder & CTO, FirstPoint Mobile Guard.

Read more

IoT Security Foundation launches co-ordinated vulnerability disclosure platform for industry

An online platform designed to help Internet of Things (IoT) vendors receive, assess, manage and mitigate vulnerability reports has been launched by the IoT Security Foundation (IoTSF). VulnerableThings.com aims to simplify the reporting and management of vulnerabilities whilst helping IoT vendors comply with new consumer IoT security standards and regulations.

Read more

IoT Security through the Intersection of Intelligence & Connectivity

NEW! Webinar online 31st March | 3pm UK Join us on a webinar with George Malim, Chris Francosky, Marco Bijvelds and James Moar where we provide strategies for incorporating security by design at the outset of a project, deliver insights for architecting a security framework that safeguards all layers of the IoT stack, and discuss

Read more

Securing the IoT: Assessing the requirements for an IoT security strategy

Assessing the requirements for an IoT security strategy in the business environment needs careful attention these days. With cyber threats rife and frequent reports of security breaches to businesses big and small, no one is safe, and many are not prepared.

Read more

IoT relies on five key attributes to ensure a secure foundation for services to run over

Security in IoT is a process that relies on continuous security across five key dimensions of an IoT service. These five attributes are Secure Boot, Secure Firmware over the Air, Secure Physical Interface and APIs, Secure Physical Transport Layer and Robustness. Here, Mats Andersson, the senior director of technology for short range wireless at u-blox,

Read more

Does securing IoT sensors make you WannaCry?

Mention IoT security to most people in the industry these days and they’re sure to make reference to the recent WannaCry ransomware attack which hit major industrial enterprises and public bodies worldwide. The malware exploited vulnerabilities in instances of Windows operating systems which were either no longer supported or unpatched, and while such weaknesses are

Read more

Edge computing powers devices to process before transmission

Mike Bell is the executive vice president of IoT & Devices at Canonical. He joined the company in October 2016 from car maker Jaguar Land Rover’s connected car and in-car entertainment business. This background gives him great familiarity with embedded devices as Canonical focuses its IoT and devices efforts on the mobility, industrial, networking and

Read more

Skip the scary stories and focus on what you need to secure in manufacturing IoT

Security issues in the connected and PC-dominated world are nothing new. With thousands of IoT devices connected every year, companies and security providers have increased their  understanding of how to deal with new threats.

Read more

A new formula for IoT security is risk equals probability multiplied by loss

The climate of fear surrounding IoT security suggests that it is different to standard IT or internet security but in reality, the fundamentals of securing things are no different to securing servers or personal data. What is different, though, finds George Malim is that in IoT the stakes in terms of the potential damage security

Read more

IoT needs security by design… not as an afterthought

Syed Hosain is the chief technology officer of Aeris, a technology provider and a cellular network operator that delivers comprehensive IoT and M2M services to leading brands. As IoT matures and scales up, it’s clear that the security issues that afflict the wider internet are also present in IoT but they are also accompanied by

Read more

Infotecs enables the IoT: showcase their high-security solutions at Security of Things World in Berlin

The high-security provider Infotecs showcased IoT Security Enablement with its ability to provide secure connectivity from any device at the event Security of Things World in Berlin, 27-28th June 2016.

Read more

Monetising IoT conference to tackle security and big data challenges and support IoT for enterprise

The Monetising Internet of Things event series has announced its Copenhagen conference program and initial speaker line-up.

Read more

Most IT professionals ‘unaware’ of how to secure IoT devices on their networks, says ForeScout survey

ForeScout® Technologies, Inc. has announced the findings of its new “Enterprise Internet of Things (IoT) Survey”.

Read more