Internet of Things (IoT) Privacy and Data Governance
When data can be effectively used to guide actions and gain useful insights, it's an increasingly large part of a technology company's value.
Safeguarding healthcare IoT cannot be an afterthought. Simon Moffatt of ForgeRock offers five steps to take on the path to secure healthcare IoT.
How can small and medium-sized cities invest in smart tech? More With Mobile founder Ken Figueredo says they should learn from large cities' successes.
One of the most significant challenges of security in IoT is how to talk about security, says Ted Harrington of Independent Security Evaluators.
With the arrival of IoT and technology advancements in our homes and in our lives, security and privacy are becoming more important than ever.
Organizations that are integrating IoT into their business should equally prepare for a deep digital transformation in their cyber and compliance practices.
Follow these steps to make your smart city implementation go smoothly, so city leaders and the public can benefit from modern-day investments.
Two standards efforts, both built on OAuth, have risen to a new level of maturity; it's time to give them a serious look in connection with IoT.
Currently ranking as top job in the U.S., the data scientist role is in high demand. Here's what you need to know to succeed.
When deciding on a "pull" or "push" IoT data flow model, be sure to match the pros and cons of each to your organization's overall goals.
A 2014 article in The Economist took a look at the 'overhyped' 'internet of nothings.' Fast-forward to today – is IoT still 'nothing'?
Don’t treat privacy compliance as drag n’ drop; take these steps to progress your IoT data privacy journey and get ready for your GDPR close-up.
While IoT is more pervasive than enterprise mobility, IoT adoption could be made smoother if we take lessons learned from EMM principles and functions.
As exciting as emerging connected technologies appear on paper, there is still an underlying concern about whether we can trust them.
Building security into embedded system hardware helps regulators lock down specific functions while allowing consumers to tweak other parts of their product.
IoT can be a strong component to ensure compliance with privacy regulations, creating a contextual perimeter for your data and your organization.
When it comes to data privacy regulations, change is on the horizon, especially as it relates to organizations analyzing internet of things data.
This IoT security cheat sheet offers real-world steps to take to ensure your organization stays secure as the IoT wave continues across industries.
IoT privacy and security advocates must discuss the real risks and offer solutions to a problem that is vague, threatening and of colossal scale.
While news of wearable hacks is making headlines, don't tear the device off your wrist just yet. Let's assess the likelihood of an attack on authentication sensor data.
IoT can change the way we live, but only if a platform like blockchain protects your privacy and data in an accessible, scalable fashion.
The third wave of mobile apps is upon us. For it to perform reliably, the connected mobile app wave requires proper security and governance.
A holistic risk management approach allows you to develop and deploy a critical, hyper-connected IoT infrastructure without compromising security.
Whatever internet of things pilot or strategy your organization chooses, compliance and security operations must drive your capabilities.
If manufacturers and healthcare systems can together tackle the connected medical device security challenge, it will create a safer environment for patients.
Knowing where data resides in an IoT world is critical; consider the benefits of identifying data, keeping it available and using it for more efficient use cases.
The rise of the internet of things combined with a fast-changing regulatory environment requires a new mindset on consent and privacy -- and soon.
In part one of this two-part Q&A, Whit Diffie weighs in on the privacy risks in an unprotected IoT world and explains why he doesn't own a Nest thermostat.
Blockchain, while still an emerging solution, is one of the more intriguing technologies with potential to set us down the road towards a secure IoT world.
To secure the exploding number of IP connected created by IoT, big data and cloud services, connections must be underpinned by encryption and a VPN.
Overcoming the internet of things security challenge requires the work of consumers, vendors and governments alike.
If you would like to rely on a wearable as a source of identity verification, there are some key things to keep in mind.
There are a variety of actions manufacturers, service providers and consumers alike can take to work towards greater overall IoT security.
The rapid influx of potentially insecure connected devices poses more targets for cyberattacks, upping the ante for cybersecurity.
Secure connectivity infrastructure in an IoT-enabled world includes a few basic building blocks that every organization should be aware of.
To avoid ending up siloed, city leaders should plan ahead and create a blueprint of how they want data to integrate and flow in their smart city.
Emerging technologies such as IoT, AI and machine learning will not make everyone a data scientist, but they will help make data scientists more productive.
In a world of evolving cyberthreats, how can governments protect data? Enter blockchain, a growing presence as we move further into the IoT age.
Recent DDoS attacks demonstrated the potential devastation of IoT, which should serve as a call for enterprises to calculate their digital risk appetite.
In this Q&A, Chris Witeck and Jeffrey Sanderson of Citrix sit down and discuss the evolution of securing IoT in the enterprise.
Blockchain technology is useful in its own way, but is it the answer to securing an internet of things deployment? Learn more.
As the internet of things gains traction, data protection is a must. Learn how three encryption methods can help secure the IoT-enabled workplace.
Defending against IoT attacks is different than what we're used to; there is need for a real paradigm shift in the development of defense measures for IoT.
Without trusted data, we cannot act or bring about real change. In IoT, we have to close the loop in order to trust the data, trust the route and trust the information that is sent back.
We can't expect private key infrastructure to scale for the internet of things; it's time to look beyond PKI to keep IoT safe.
The implications of privacy protection issues in the IoT arena have the potential to extend due diligence considerations for CEOs and board liabilities.
IoT security must play an integral role throughout the lifecycle of IoT data to avoid network penetrations and data breaches.
When it comes to the internet of things, it's important to talk about and understand its past in order to understand its future.
Deciding what type and how much IoT data your organization is going to keep isn't an easy task. Think it through thoroughly – and think of the future, too.
Delve into technological enablers that could be the main building blocks for better IoT security in consumer, enterprise and industrial settings.
New data privacy regulations and company efforts are making strides in establishing digital trust in the era of the internet of things.
Internet of things benefits cannot be enjoyed if IoT data isn't readily available. Learn how providing availability at the back-end can help.
Before moving from an IT security architecture to an IoT security architecture, there are three fundamental questions organizations should ask themselves.
The Internet of Things is cool and its doors are new and enabling. But the battleground will mainly focus on IoT data: the ownership and control.
Numerous consumer privacy and security concerns plague connected devices. Would a consumer bill of privacy rights ease their worries?
Smart garments and e-textiles (which meld traditional fabrics with cutting-edge technology) are altering the landscape of fashion, apparel, retail and furnishing sectors. While the methods for ...