IoT Agenda
Internet of Things (IoT) Security
-
IoT attack trends -- and how to mitigate them
- Morphisec 31 Mar 2017 -
Preventing bot brawls in the connected home
- People Power 27 Mar 2017 -
IoT: Not as new as you think
- Fortinet 23 Mar 2017
Given the sheer variety of IoT devices and opportunities to exploit them, IoT attack trends will develop in several directions.
Bots can help companies apply ambient computing to smart devices, but before doing so the issue of bot brawls must be solved.
When it comes to securing IoT, we have a lot to learn from the ICS/SCADA professionals who, for decades, have been protecting our critical infrastructures.
-
Debating IoT security at MIT Connected Things
- Red Hat 22 Mar 2017 -
Properly managing IIoT systems to prevent cyberattacks
- NCP engineering 21 Mar 2017 -
Strong (and aerobically fit) authentication
- Ping Identity 20 Mar 2017 -
A pulse on IoT at HIMSS17
- Splunk 17 Mar 2017 -
IoT in the blockchain world
16 Mar 2017 -
Security and governance: Immediate priorities for connected mobile apps
- IrecaMedia 15 Mar 2017 -
Your device is insecure. Use a gateway.
- Red Hat 09 Mar 2017
Spirited panels on IoT security ended the MIT Connected Things 2017 event, exposing the tradeoffs involved in security devices outside of IIoT environments.
Securing IIoT systems with VPN management will help enterprises stay ahead of future cybersecurity threats against connected systems.
While news of wearable hacks is making headlines, don't tear the device off your wrist just yet. Let's assess the likelihood of an attack on authentication sensor data.
IoT is having a profound impact on healthcare, as experienced at HIMSS17. Its success depends on an organization's ability to harness machine data securely.
IoT can change the way we live, but only if a platform like blockchain protects your privacy and data in an accessible, scalable fashion.
The third wave of mobile apps is upon us. For it to perform reliably, the connected mobile app wave requires proper security and governance.
We must have a plan B for when security breaks down. Approaching IoT as an architecture in which devices are protected behind a gateway is a good start.
-
IoT security: It takes a village
- Cisco Jasper 09 Mar 2017 -
IoT is everywhere -- your security should be too
- Fortinet 08 Mar 2017 -
Three actions for mitigating information risk in your IoT foundation
- EmeSec Incorporated 08 Mar 2017 -
Connected medical device security: The usefulness of unenforceable guidance
- Independent Security Evaluators 01 Mar 2017
Achieving and maintaining IoT security takes a village, one that works together in close cooperation with the other players in the security ecosystem.
A holistic risk management approach allows you to develop and deploy a critical, hyper-connected IoT infrastructure without compromising security.
Whatever internet of things pilot or strategy your organization chooses, compliance and security operations must drive your capabilities.
If manufacturers and healthcare systems can together tackle the connected medical device security challenge, it will create a safer environment for patients.