IoT Agenda:

Security


August 29, 2018  12:26 PM

Is facial recognition the killer app for AI?

Sudha Jamthe Sudha Jamthe Profile: Sudha Jamthe
ai, airport, Artificial intelligence, Biomemetics robotics, drone, Drones, ethics, Facial recognition, Internet of Things, iot, robot, ROBOTS, security camera network, Security Cameras, smart city

The power of facial recognition has knocked at my door. My Nest Cam IQ Outdoor sends me a notification when a stranger stops at my front door. Facial recognition has the power to transform us to tightly integrated...

August 28, 2018  12:13 PM

Internet of threats: Managing risk and governing it

Ofer Amitai Profile: Ofer Amitai
Governance, Internet of Things, iot, IoT devices, iot security, legislation, patch, patching, regulation, security in IOT, Security patches, security Patching

By now, we have an understanding that IoT devices, while useful and convenient, come with many security concerns. The simplicity that consumers love about IoT devices is, in fact, what makes them so risky. IoT devices are easy to connect to remotely by just about anyone and, unfortunately, not just...


August 20, 2018  2:08 PM

The military strategy behind cyberattacks and how they’re designed

Deepak Puri Profile: Deepak Puri
Cyberattacks, cybersecurity, cyberwarfare, iot security

Cyberwarfare can devastate economies with connected infrastructure. Military strategy uses such attacks because they're hard to defend against and very cost-effective. The Allies bombed German ball-bearing plants in World War II because destroying them would degrade the German production of...


August 15, 2018  9:48 AM

IoT security watch: Data breach legislation is coming, first stop California

Tae Jin Kang Profile: Tae Jin Kang
data breaches, Data-security, GDPR, Internet of Things, iot, iot security, regulation, Software security

On May 25, the European Union enacted the most stringent data protection and breach fines in the world under the new General Data Protection Regulation. As stated by the EU,...


August 10, 2018  11:38 AM

Technologists and fashionistas design with IoT in mind

Paula Hunter Profile: Paula Hunter
Authentication, Customer data, Customer service, Digital content, Internet of Things, iot, IoT data, near field communication, NFC, service, Wearables

I recently presented at the three-day Wear Conference in New York City to a room crowded with fashionistas and technologists all talking about the internet of things. The conference was very technical, focusing on IoT...


August 8, 2018  11:03 AM

Top 5 challenges of navigating the IoT security minefield

Andrew Useckas Profile: Andrew Useckas
Botnet, DDOS, Enterprise IoT, Internet of Things, iot, IoT devices, iot security, malware, nist, security in IOT

I received an email from a security camera vendor today. The main selling point for its product is, "You can access your video from anywhere, on any device, at any time." In other words, "We store your data in the cloud." Just a quick glance at its website revealed there are no third-party audits...


August 6, 2018  11:13 AM

The ‘Brave New World’ of IoT-connected smart cities

Sanjay Kumar Profile: Sanjay Kumar
5G, Authentication, Authorization, Efficiency, Energy efficiency, Internet of Things, iot, IoT data, iot security, IoT sensors, Smart cities, smart city, Telecom, telecom service providers, traffic

I may be a technologist by trade, but I'm a dreamer at heart -- and these days my dreams are dominated by the vision of a beautiful, connected world in which we can share ideas, thoughts and knowledge instantly and meaningfully. True, those words were once used to describe the internet, but I'm...


August 2, 2018  1:20 PM

Face recognition: Real 3D versus academic 2D

George Brostoff George Brostoff Profile: George Brostoff
3D, Authentication, Facial recognition, IoT applications, nist, RAND, Recognition

Almost daily we hear about face recognition. From the contested accuracy of Apple's FaceID on its latest iPhone to testing by NIST or even apprehension at the ACLU, there are...


August 2, 2018  11:00 AM

Can security keep pace with the rise of the machines?

Gorav Arora Gorav Arora Profile: Gorav Arora
Authentication, Certificate, Data breach, identity, Identity management, iot, IoT devices, iot security, Key, security in IOT, Smart machines, Unique key

Machines are increasingly taking over tasks traditionally conducted by humans, often working independently to improve business productivity. But if we want our security measures to keep pace as more and more machines come into existence, we need to be able to reliably determine which machines...


July 27, 2018  12:57 PM

Managing IoT resources with access control

Peter Newton Profile: Peter Newton
Access control, cybercriminals, Digital transformation, Digitization, Hackers, Internet of Things, Inventory, iot, iot security, Security Access Control, security in IOT, Stuxnet

As IoT devices continue to be adopted by organizations in record numbers, two things have become clear. First, far too many of these devices do not include adequate security, meaning they can be easily compromised to serve as slaves in IoT-based botnets, act as a conduit for the spread of malware,...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: