Given the sheer variety of IoT devices and opportunities to exploit them, IoT attack trends will develop in several directions.
There is a tremendous amount of potential in wearable technology to collect data from the foot; enter textile pressure sensor applications in socks.
Creating deeper and more consistent engagement between academic institutions and employers will go a long way toward ending the skills gap.
Geolocation mapping -- which enables us to use maps in revolutionary ways -- will become increasingly important to IoT.
There are five qualities and skills essential to being a successful IoT developer in today's fast-paced age of "connected everything" -- do you have them?
Explore the top five benefits of real-time business intelligence for utility companies, from optimizing asset performance to boosting customer satisfaction.
Bots can help companies apply ambient computing to smart devices, but before doing so the issue of bot brawls must be solved.
Unlike today's internet, the amazing diversity of applications in dozens of industries cannot be easily addressed by a single IIoT connectivity technology.
When it comes to securing IoT, we have a lot to learn from the ICS/SCADA professionals who, for decades, have been protecting our critical infrastructures.
The lack of standardization for internet communication protocols has limited the ability for developers to create new IIoT apps.
Spirited panels on IoT security ended the MIT Connected Things 2017 event, exposing the tradeoffs involved in security devices outside of IIoT environments.
Businesses of all shapes and sizes are investing in smart LEDs, as intelligent buildings are helping cut energy costs -- and the way the business operates.
Internet of things products using NFC technology came up big at the NFC Forum Innovation Awards – learn more about the winners and finalists.
Securing IIoT systems with VPN management will help enterprises stay ahead of future cybersecurity threats against connected systems.
While news of wearable hacks is making headlines, don't tear the device off your wrist just yet. Let's assess the likelihood of an attack on authentication sensor data.