IoT Agenda:

securing IoT


May 21, 2019  2:05 PM

The future of IoT requires a cybersecurity standard

Sameer Dixit Profile: Sameer Dixit
cybersecurity standards, Internet of Things, iot, IoT cybersecurity, IoT devices, IoT regulations, iot security, IoT standards, securing IoT, security standards

The IoT revolution is in full swing. Smart watches, smart speakers, connected refrigerators and AI thermostats and doorbells are just the tip of the iceberg in terms of IoT, though. Legacy infrastructure in industries, such as transportation, manufacturing, utilities and logistics, is also being...

May 17, 2019  11:21 AM

Mastering IoT compliance in a GDPR world

Reggie Best Profile: Reggie Best
Compliance, GDPR, Internet of Things, iot, IoT compliance, iot security, Network monitoring, network visibility, Policy Management, securing IoT

Believe it or not, the one-year anniversary of the date the General Data Protection Regulation went into effect is almost upon us. The May 25, 2018 date will live in infamy for many organizations --...


May 16, 2019  12:26 PM

It’s time to get serious about securing the internet of things

Dan Timpson Profile: Dan Timpson
Certificate authority, digital certificate, Internet of Things, iot, IoT authentication, iot security, IoT threats, PKI, Public-key infrastructure, securing IoT

Not long ago, many IT leaders viewed IoT as little more than an interesting science project. Today, companies in every industry rely on IoT insights as part of their core business strategies. According to DigiCert's recent " 0 Comments     RSS Feed     Email a friend


May 13, 2019  1:37 PM

Protecting the modern infotainment system

David Barzilai Profile: David Barzilai
Buffer overflow, car security, Connected car, connected car security, Cyberattack, embedded security, infotainment, Internet of Things, iot, iot security, remote hacking, securing IoT

Whether you are glancing at GPS prompts, connecting to your favorite streaming satellite music station or using Bluetooth in conjunction with a dizzying number of apps available on your smartphone, the infotainment system in your car is largely innocuous and inconspicuous -- at least in the grand...


May 8, 2019  12:21 PM

The common misnomer about recent Nest hack reports

Alec Rooney Profile: Alec Rooney
2FA, Authentication, Internet of Things, iot, IoT devices, iot security, password security, securing IoT, Two factor authentication

Recently, Nest has made attention-grabbing headlines for security incidents. One Nest owner heard 0 Comments     RSS Feed     Email a friend


May 7, 2019  1:59 PM

Why are connected devices leaving UK businesses as vulnerable as ever in 2019?

Myles Bray Profile: Myles Bray
Cyberattacks, cybersecurity, IIoT security, Internet of Things, iot, IoT devices, iot security, IT security, malware, Network security, network visibility, OT security, securing IoT

By now, we have become all too familiar with the volatile state of the enterprise cybersecurity landscape. Businesses across the globe are enduring an endless barrage of security threats. These cyberattacks -- such as


May 6, 2019  11:32 AM

Due diligence and compliance in IoT with digital twins and mirrors

Maria Horton Profile: Maria Horton
ai, AI security, digital twin, digital twin security, incident response plan, Internet of Things, iot, IoT compliance, iot security, IoT threats, mirrored world, mirrors, Risk management, securing IoT, Virtualization

Part of speed to market and efficient market investment management is the use of digital resources to create, adapt, manage and extend new revenue services. This is the foundation of today's rapid IoT and AI application growth. Digital transformation with IoT and AI tools is effectively a...


May 2, 2019  3:17 PM

Can California legislation save the world from IoT security risks?

Guy Rosefelt Profile: Guy Rosefelt
Internet of Things, iot, IoT devices, IoT legislation, IoT regulations, iot security, IoT threats, malware, password security, Passwords, securing IoT, Security legislation, security regulations

I am known for railing against IoT devices because I consider them the eventual destroyers of the internet as we know it. They are not secure, most people that use them do not realize they are not secure, and most vendors that make them have done little knowing they are not secure. Having said...


May 1, 2019  12:44 PM

Beyond SB-327: Moving toward true IoT security

Arshad Noor Profile: Arshad Noor
Authentication, FIDO, FIDO Alliance, Internet of Things, iot, iot security, password security, Passwords, securing IoT, U2F

In light of a cybersecurity environment of never-ending attack vectors, legislators are working to make the digital world more secure. The California Consumer Privacy Act (CCPA), set to take effect on January 1, 2020, has grabbed most of the headlines in this regard, but a little-known bill called...


April 15, 2019  12:48 PM

Securing the IoT edge

John Maddison Profile: John Maddison
Authentication, credentials, Edge computing, edge security, firewall, intent-based segmentation, Internet of Things, iot, IoT communications, IoT devices, IoT edge, IoT encryption, iot security, network access control, securing IoT, Segmentation

The network has undergone a remarkable amount of change over a remarkably short period of time. The clearly defined perimeters of traditional networks have been eroded away by BYOD, mobile computing, migration to the cloud, IoT adoption and the new WAN edge. Of course, this sort of evolution is...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: