Internet of Things (IoT) Privacy and Data Governance
Organizations that are integrating IoT into their business should equally prepare for a deep digital transformation in their cyber and compliance practices.
Follow these steps to make your smart city implementation go smoothly, so city leaders and the public can benefit from modern-day investments.
Two standards efforts, both built on OAuth, have risen to a new level of maturity; it's time to give them a serious look in connection with IoT.
Currently ranking as top job in the U.S., the data scientist role is in high demand. Here's what you need to know to succeed.
When deciding on a "pull" or "push" IoT data flow model, be sure to match the pros and cons of each to your organization's overall goals.
A 2014 article in The Economist took a look at the 'overhyped' 'internet of nothings.' Fast-forward to today – is IoT still 'nothing'?
Don’t treat privacy compliance as drag n’ drop; take these steps to progress your IoT data privacy journey and get ready for your GDPR close-up.
While IoT is more pervasive than enterprise mobility, IoT adoption could be made smoother if we take lessons learned from EMM principles and functions.
As exciting as emerging connected technologies appear on paper, there is still an underlying concern about whether we can trust them.
Building security into embedded system hardware helps regulators lock down specific functions while allowing consumers to tweak other parts of their product.
IoT can be a strong component to ensure compliance with privacy regulations, creating a contextual perimeter for your data and your organization.
When it comes to data privacy regulations, change is on the horizon, especially as it relates to organizations analyzing internet of things data.
This IoT security cheat sheet offers real-world steps to take to ensure your organization stays secure as the IoT wave continues across industries.
IoT privacy and security advocates must discuss the real risks and offer solutions to a problem that is vague, threatening and of colossal scale.
While news of wearable hacks is making headlines, don't tear the device off your wrist just yet. Let's assess the likelihood of an attack on authentication sensor data.