IoT Agenda:

cybersecurity


November 27, 2019  11:29 AM

Cybersecurity risks affect IIoT fog computing

Julian Weinberger Profile: Julian Weinberger
Cyberattacks, cybersecurity, encrypted communications, Encryption, fog computing, IIoT, IIoT data, IIoT security, remote access vpn, VPN

Cloud computing within IIoT is creating new opportunities for manufacturers and industrial systems. From connected cars and smart cities to real-time analytics and 5G mobile, IIoT sensors are generating data in unprecedented volumes. Since most essential smart factory services would be...

November 26, 2019  5:16 PM

Secure IoT devices and networks and bears, oh my!

Cheryl Ajluni Profile: Cheryl Ajluni
Cyberattacks, cybersecurity, Internet of Things, iot, IoT attacks, IoT cybersecurity, iot security, IoT strategy

There is a popular saying that goes something like this: You don't have to run faster than the bear to get away. You just have to run faster than the slowest guy running from the bear. As it turns out, that saying is as good a metaphor for life as it is for security in IoT. It all...


October 28, 2019  3:48 PM

Developing a defense-in-depth security practice for IoT

Galen Hunt Profile: Galen Hunt
connected devices, cybersecurity, Internet of Things, iot, IoT cybersecurity, iot security

Do you remember that time when you bought an SUV, renowned for its auto safety, and then decided that there was no need to wear a seatbelt? Or that time you decided not to install a smoke alarm because there was already a fire extinguisher in the house? These don’t sound like familiar...


October 24, 2019  2:54 PM

IoT security policy requires comprehensive, expansive visibility

Reggie Best Profile: Reggie Best
cybersecurity, healthcare IoT, Internet of Things, iot, IoT cybersecurity, iot security, security awareness, security in IOT

IoT is a black hole; every day it’s sucking in devices that must be secured. But IoT is also a nebulous term. Although emerging devices are easily identified at inception, decades-old technology has become part of the IoT universe --sometimes stealthily --and must be dealt with. These devices...


October 21, 2019  1:50 PM

3 more emerging attack surfaces need greater security

Carolyn Crandall Profile: Carolyn Crandall
cybersecurity, Internet of Things, iot, IoT applications, IoT cybersecurity, IoT network monitoring, iot security, Security threats, Shadow IT

This is the second part in a two-part series. Find the first part here. IoT is far from the only emerging attack surface being targeted and...


October 9, 2019  2:35 PM

Securing your supply chain is as important as securing your devices

Wayne Dorris Profile: Wayne Dorris
cybersecurity, Internet of Things, iot, IoT cybersecurity, iot security

The Ponemon Institute published its annual report on third-party IoT risks in May, 2019. The report focused on identifying what companies do not know -- or understand -- about the risks inherent to IoT devices and applications, particularly when used by third parties. The report drives home the...


September 26, 2019  11:57 AM

4 ways to minimize IoT cybersecurity risks

Thomas Ryd Profile: Thomas Ryd
cybersecurity, Cybersecurity legislation, Internet of Things, iot, IoT cybersecurity, iot security

With close to 400k followers, the Twitter account named Internet of Shit is the epitome of the dire situation emerging as we stumble into a world of connected devices. Governments around the world are waking up to a reality where the


July 1, 2019  2:46 PM

What the rise of industrial IoT means for cybersecurity

Andrew Howard Profile: Andrew Howard
cybersecurity, IIoT, IIoT security, industrial internet of things, Industrial IoT, IoT cybersecurity, iot security, malware

It is difficult to find an industrial or operational technology firm today not focused on -- or at least exploring how to -- incorporate IoT. According to some estimates, the industrial IoT industry will have more than 46 billion active industrial connections by 2023. The market is demanding smart...


June 17, 2019  2:03 PM

IoT, cloud, security and the IT professional: Transforming traditional roles

Andreas Pettersson Profile: Andreas Pettersson
Cloud Computing, cybersecurity, Internet of Things, iot, IoT cloud, IoT communications, IoT professionals, iot security, IT teams, Physical security

Today's IT professionals must have it all: knowledge of scripting, networks, application development, artificial intelligence, architecture and more. But it wasn't always this way, as we're seeing the role of IT shift significantly with the proliferation of the latest technological advancements,...


May 7, 2019  1:59 PM

Why are connected devices leaving UK businesses as vulnerable as ever in 2019?

Myles Bray Profile: Myles Bray
Cyberattacks, cybersecurity, IIoT security, Internet of Things, iot, IoT devices, iot security, IT security, malware, Network security, network visibility, OT security, securing IoT

By now, we have become all too familiar with the volatile state of the enterprise cybersecurity landscape. Businesses across the globe are enduring an endless barrage of security threats. These cyberattacks -- such as


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: