IoT Agenda:

Encryption


January 28, 2019  11:41 AM

Navigating the IoT security minefield: API security

Andrew Useckas Profile: Andrew Useckas
API, Application Programming Interface, Authentication, Authorization, Encryption, Internet of Things, iot, iot security, securing IoT, TLS, tokens, UI

The rapid growth of the internet of things has seen a subsequent rise in the adoption of APIs. In IoT, most devices communicate to the cloud via RESTful API calls as they are ideal for physical device communication....

January 23, 2019  10:44 AM

Is IoT getting more secure?

Gorav Arora Gorav Arora Profile: Gorav Arora
Blockchain, Consumer IoT, DDOS, Encryption, Enterprise IoT, Internet of Things, iot, iot security, Mirai, Password management, securing IoT, security regulations

New data tells us that stakeholders in the internet of things are making progress when it comes to securing IoT infrastructure and the data it produces, but there is still a long way to go. In order to assess the current state of affairs, Gemalto 0 Comments     RSS Feed     Email a friend


November 5, 2018  12:52 PM

Challenges of data management in the internet of things

Chiaren Cushing Profile: Chiaren Cushing
Data Management, Encryption, Enterprise IoT, HSM, Infrastructure, Internet of Things, iot, IoT applications, IoT data, iot security, Key management

The trajectory of data growth resulting from myriad devices -- macro to micro -- that capture or create data is beyond astounding. There's more data today than yesterday; there will be more -- much more -- data tomorrow than today. The internet of things is the newest contributor to the massive...


October 3, 2018  10:41 AM

Protecting the internet of things

Chiaren Cushing Profile: Chiaren Cushing
Cloud Security, Cyberattacks, cybersecurity, Data Encryption, Data-security, Encryption, Hardware security, HSM, Internet of Things, iot, IoT data, iot security, security in IOT

Myriad articles have already been written regarding the internet of things. Advances in computing, communications and sensor technologies bring intelligence to previously passive objects, create new business models, drastically increase the volumes of data generated and improve the precision,...


September 12, 2018  12:17 PM

Speck finding its place in the internet of things

Bill Horne Profile: Bill Horne
AES, Cryptographic encryption, Cryptography, Decryption, Encryption, Internet of Things, iot, IoT applications, IoT devices, iot security, security in IOT, White box

In some IoT applications, devices such as RFID tags, sensors, contactless smart cards and medical devices, have only limited computational capability because of cost or power reasons. Yet, security is still a critically important requirement, and cryptography is a basic building block that needs to...


September 6, 2018  10:22 AM

Professional services industry and IoT: The tech problems this industry faces

Josh Garrett Profile: Josh Garrett
algorithm, Authorization, Automation, breach, cloud, Data, digital, Encryption, firewall, Internet of Things, iot, IT, Mobile, Network, SaaS, Security, service provider, Services, Strategy, Technology

Today, more than half -- 59% -- of the professional services sector doesn't have a single digital business strategy. For most professional...


July 2, 2018  4:23 PM

How organizations can prepare for an IoT-based attack

Richard Blech Profile: Richard Blech
Botnet, Data-security, Encryption, Internet of Things, iot, IoT data, IoT devices, iot security, Risk assessment, security in IOT

Preparing for battle: Stopping IoT attacks

With Gartner predicting a world filled with more than 20 billion IoT devices by 2020, we're...


June 11, 2018  1:05 PM

The DHS cybersecurity strategy and IoT security

John Grimm Profile: John Grimm
Consumer IoT, cybersecurity, DHS, Encryption, Enterprise IoT, Internet of Things, iot, IoT devices, iot security, patching, security in IOT, Updates

On May 15, the Department of Homeland Security released its cybersecurity strategy. The strategy puts forward a sensible, risk-based approach to resilient security, including strong, consistent...


May 25, 2018  2:04 PM

How IoT is reshaping the cybersecurity landscape

Richard Blech Profile: Richard Blech
Data ownership, Digital certificates, Encryption, Enterprise IoT, Internet of Things, iot, IoT data, IoT devices, iot security, security in IOT, Security key, Two factor authentication

The rise of connected devices has led to new challenges in today's cybersecurity landscape. With an increase in device threats and the population of cybercriminals, IoT security has quickly become a top concern and big issue for businesses worldwide. If organizations want to continue to innovate,...


May 9, 2018  1:23 PM

Treating IoT security as a first-class citizen

Dipesh Patel Profile: Dipesh Patel
Communications, Encryption, Enterprise IoT, Firmware, Internet of Things, iot, iot security, PSA, security in IOT, TLS

As recent security breaches have shown, malicious actors are becoming increasingly clever and sophisticated. They break in through unlocked doors, such as weak or nonexistent...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: