Enterprise Internet of Things (IoT)
IoT requires owner-controlled PKI to provide independent security control, but it doesn't take device manufacturers out of the security equation.
When it comes to data privacy regulations, change is on the horizon, especially as it relates to organizations analyzing internet of things data.
Autonomous drones have the limelight, but cannot fly in most places because they lack command and control and identification needed by regulators.
This IoT security cheat sheet offers real-world steps to take to ensure your organization stays secure as the IoT wave continues across industries.
Get clarity around acronyms related to the internet of things and IoT devices from Blue Hill Research's Ralph Rodriguez and Charlotte O'Donnelly.
Far too many organizations stop after collecting IoT data. To be successful, it is critical to integrate that data into your analytics strategy.
Hardware device businesses must work intelligently and diligently to control, secure and monetize their devices and deter grey market production.
Don't confuse data with information. Data, by itself, isn't necessarily useable. The power of IoT is its ability to gather and synthesize data.
IoT complexity can be mastered using a building-block approach built upon a platform whose solid basis is an OS that is both configurable and modular.