IoT Agenda:

Cyberattacks


October 8, 2019  3:40 PM

Emerging IoT attack surfaces present attackers with tempting new targets

Carolyn Crandall Profile: Carolyn Crandall
Cyber, Cyber security, Cyberattacks, IIoT security, Internet of Things, iot, IoT cybersecurity, iot security

This is the first in a two-part series. The meteoric rise of IoT has created a popular new attack surface for cybercriminals. The "2019 Sonic Wall Cyber Threat Report" indicated that there were 32.7 million cyberattacks targeting IoT devices in 2018, representing a 217.5% increase over...

September 20, 2019  5:06 PM

Secure the mix of legacy and modern solutions in IIoT

Gavin Hill Profile: Gavin Hill
Cyberattacks, IIoT, IIoT network, IIoT security, Internet of Things, iot, IoT cybersecurity, IoT network monitoring

Logistics today is governed by a set of principles called the seven Rs: the right product, the right customer, the right price, the right quantity, the right condition, the right place and the right time. Upholding these principles demands a Herculean effort. Luckily, logistics managers have some...


July 8, 2019  2:59 PM

Security controls must keep pace with internet-connected devices

Carolyn Crandall Profile: Carolyn Crandall
Cyber security, Cyberattacks, Internet of Things, iot, IoT cybersecurity, iot security

The ability to connect devices is becoming the standard across all facets of technology. We are seeing this in everything from smart cities to tea pots and toasters. New IoT devices are popping up daily, rapidly adding to the 23 billion that already exist. These devices are designed for...


June 28, 2019  12:24 PM

IIoT security’s biggest challenges and roadblocks

Juned Ghanchi Profile: Juned Ghanchi
Blockchain, Cyberattacks, IIoT, IIoT security, industrial internet of things, Industrial IoT, Internet of Things, IoT cybersecurity, iot security, Phishing

IoT is no longer limited to smart home gadgets; it's increasingly included in smart automation initiatives in workplaces and businesses. But the


June 27, 2019  4:10 PM

Protect expanding smart cities from cyberthreats with cloud to flash

Yoni Kahana Profile: Yoni Kahana
connected devices, Cyberattacks, Internet of Things, iot, IoT cybersecurity, iot security, Smart cities

With more than a third of U.S. households owning smart homes and more than half planning to invest in one in the next year, it's clear that more and more people are connecting to IoT. With increasing advancements like connected cars, smart buildings and even smart infrastructure, it's no longer...


May 7, 2019  1:59 PM

Why are connected devices leaving UK businesses as vulnerable as ever in 2019?

Myles Bray Profile: Myles Bray
Cyberattacks, cybersecurity, IIoT security, Internet of Things, iot, IoT devices, iot security, IT security, malware, Network security, network visibility, OT security, securing IoT

By now, we have become all too familiar with the volatile state of the enterprise cybersecurity landscape. Businesses across the globe are enduring an endless barrage of security threats. These cyberattacks -- such as


February 4, 2019  12:51 PM

IoT security trends to watch in 2019

Andrew Howard Profile: Andrew Howard
Artificial intelligence, Blockchain, bug bounty, Cyberattacks, Cyberinsurance, Internet of Things, iot, iot security, IoT threats, Machine learning, malware, securing IoT, Security threats

The IoT market continues to grow, with investments expected to top $1 trillion by 2020, according to IDC. With the rollout of 5G, 0 Comments     RSS Feed     Email a friend


October 3, 2018  10:41 AM

Protecting the internet of things

Chiaren Cushing Profile: Chiaren Cushing
Cloud Security, Cyberattacks, cybersecurity, Data Encryption, Data-security, Encryption, Hardware security, HSM, Internet of Things, iot, IoT data, iot security, security in IOT

Myriad articles have already been written regarding the internet of things. Advances in computing, communications and sensor technologies bring intelligence to previously passive objects, create new business models, drastically increase the volumes of data generated and improve the precision,...


August 20, 2018  2:08 PM

The military strategy behind cyberattacks and how they’re designed

Deepak Puri Profile: Deepak Puri
Cyberattacks, cybersecurity, cyberwarfare, iot security

Cyberwarfare can devastate economies with connected infrastructure. Military strategy uses such attacks because they're hard to defend against and very cost-effective. The Allies bombed German ball-bearing plants in World War II because destroying them would degrade the German production of...


November 20, 2017  10:24 AM

Smart building security: Cyber-resilience must be built in

Julian Weinberger Profile: Julian Weinberger
Automation, Cyberattacks, cybersecurity, Data Encryption, Enterprise IoT, Internet of Things, iot, iot security, Machine learning, security in IOT, Smart Building, Virtual Private Network, VPN

As IoT and machine learning revolutionize the ways in which we live, work and play, it comes as no surprise that the market for smart buildings is expected...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: