security
IoT race is a marathon not a sprint – industry needs to urgently increase collaboration,’ warns oneM2M
As Mobile World Congress approaches, oneM2M’s Dr. Omar Elloumi is urging vendors to look at bigger picture to avoid industry fragmentation.Vendors rushing to be the first to release Internet of Things (IoT) gadgets and ecosystems need to urgently increase collaboration and treat the IoT race as a marathon, rather than a sprint, the chair of oneM2M Technical
Read moreBuilding security into IoT software development
‘Men occasionally stumble over the truth, but most of them pick themselves up and hurry off as if nothing ever happened.’ — Winston S. Churchill
Read moreprpl Foundation reveals vision for a secure Internet of Things
The prpl Foundation, an open-source, community-driven, collaborative, non-profit foundation supporting the next gen connected devices industry, has announced availability of a new document entitled Security Guidance for Critical Areas of Embedded Computing that lays out its revolutionary vision for a secure Internet of Things.
Read more5by5 Wireless in negotiations for large area wireless in over 30 countries
Greg Waite, CEO of InventionShare™, reported that 5by5 Wireless™ is now working with agents, country partners, governments, ISPs and telcos in various partnership programmes to support high speed internet developments through large area wireless consumer applications and IoT and smart city applications in over 30 countries.
Read moreTA Technology (Shanghai) Co Ltd becomes GlobalPlatform Observer Member
GlobalPlatform has welcomed TA Technology (Shanghai) Co., Ltd. as its latest Observer Member. Based in China, TA Technology (Shanghai) Co., Ltd. provides third-party testing and evaluation services.
Read moreEnterprise IoT: Two disparate worlds unified in the Cloud – Pt 1
Applications are created and deployed in OT domains. They operate in IT domains, alongside or incorporated in mainstream business processes like ERP. Seamless integration between these disparate worlds is a mandatory IoT requirement.
Read moreMachina Research’s predictions for the Internet of Things in 2016
Every January, Machina Research, the advisors on the Internet of Things, publishes its predictions for IoT in the coming year. This year promises to be an eventful one.
Read moreIoT Innovations at CES 2016 presented a host of new challenges for the network
At CES this year, one of the key topics has been Internet of Things adoption. The IoT has gone from an industry buzzword to a very real phenomenon affecting every one of us.
Read moreVectra Networks shows how vulnerabilities in IoT devices can create backdoors for attacks
Vectra® Networks, reports that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors.
Read moreSMiD aims to make every cloud your own private cloud, with help from Indiegogo
SMiD Cloud is a technology start-up aiming to create cybersecurity solutions that ensure the security and privacy of information stored, both in the cloud and locally.
Read moreManning the barricades: IoT, geo-fencing and personalised security
As the workplace and the Internet of Things (IoT) intersect, there is an increasing need for organisations to implement strategies to secure sensitive company data.
Read moreFinalists of the 4th IoT / M2M Innovation World Cup announced
It has been a tough evaluation process for the international expert jury of the IoT / M2M Innovation World Cup 2015/16, but the best and most innovative companies have now been selected.
Read moreSmart residential security equipment achieves ‘lift off’ in US, says IHS
For the smart home market, 2015 will be viewed as a launch-pad year for many suppliers. Although most of the top security device vendors have had smart devices in their portfolios from previous years, it was only last year that device suppliers moved to retake the ecosystem. So says Blake Kozak of IHS in a
Read moreVectra Networks shows how vulnerabilities in IoT devices can create backdoors for attacks
Vectra® Networks has announced that the Vectra Threat Labs™ has verified that consumer-grade Internet of Things (IoT) products, such as Wi-Fi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors, enabling potential attackers to remotely command and control a cyber attack without being detected by traditional security products.
Read moreDigi International launches industrial-grade LTE router for critical infrastructures markets
Digi International has introduced the Digi TransPort® WR31, a rugged, versatile enterprise LTE router built for critical applications operating in harsh environments. The WR31 features advanced security and monitoring and the intelligence to operate on nearly any 3G or 4G LTE network in the world.
Read moreThe security worries behind the wearable tech boom
There are few areas of technology, if any at all, that are growing faster than wearables. Countless enterprises and organisations across a diverse array of industries are taking advantage of these new types of technologies, exploiting the potential of 24/7 connectivity. But the wearable boom also brings with it a new set of security worries
Read more