Internet of Things (IoT) Privacy and Data Governance
To avoid ending up siloed, city leaders should plan ahead and create a blueprint of how they want data to integrate and flow in their smart city.
Emerging technologies such as IoT, AI and machine learning will not make everyone a data scientist, but they will help make data scientists more productive.
In a world of evolving cyberthreats, how can governments protect data? Enter blockchain, a growing presence as we move further into the IoT age.
Recent DDoS attacks demonstrated the potential devastation of IoT, which should serve as a call for enterprises to calculate their digital risk appetite.
In this Q&A, Chris Witeck and Jeffrey Sanderson of Citrix sit down and discuss the evolution of securing IoT in the enterprise.
Blockchain technology is useful in its own way, but is it the answer to securing an internet of things deployment? Learn more.
As the internet of things gains traction, data protection is a must. Learn how three encryption methods can help secure the IoT-enabled workplace.
Defending against IoT attacks is different than what we're used to; there is need for a real paradigm shift in the development of defense measures for IoT.
Without trusted data, we cannot act or bring about real change. In IoT, we have to close the loop in order to trust the data, trust the route and trust the information that is sent back.
We can't expect private key infrastructure to scale for the internet of things; it's time to look beyond PKI to keep IoT safe.
The implications of privacy protection issues in the IoT arena have the potential to extend due diligence considerations for CEOs and board liabilities.
IoT security must play an integral role throughout the lifecycle of IoT data to avoid network penetrations and data breaches.
When it comes to the internet of things, it's important to talk about and understand its past in order to understand its future.
Deciding what type and how much IoT data your organization is going to keep isn't an easy task. Think it through thoroughly – and think of the future, too.
Delve into technological enablers that could be the main building blocks for better IoT security in consumer, enterprise and industrial settings.