Internet of Things (IoT) Security
The 'identity of things' alone won't solve IoT's security woes, but Micro Focus' Geoff Webb says it will significantly influence the IoT worldview.
Navigating the uncharted ocean of IoT big data is exciting and challenging. Rick Harlow of Flutura mapped out seven core IIoT big data use cases to help.
Recent legislation calls for new IoT security measures. But as ThingStream's Neil Hamilton points out, the answer might already be in use today.
The benefits of IoT come with them complex security concerns. SAP National Security Services' Mark Testoni explains how to overcome the challenge.
Keeping IoT data secure requires the proper technology. Reiner Kappenberger of HPE explains how format-preserving encryption, or FPE, can help.
Fortinet's Anthony Giandomenico says IoT device manufacturers need security standards or legislation to avoid market disruptions and consumer mutinies.
IoT isn't a consumer fad; enterprises also enjoy its benefits. But, ForeScout's Pedro Abreu adds, along with benefits, enterprises must be aware of its risks.
Proper management of security secrets is no small task with many remaining in use for extended periods. Momenta Partners' Pavan Singh explains.
Embedding security in IoT chips is critical. NexLogic's Zulki Khan on important IoT PCB design and assembly points associated with embedded security.
Can millions of "dumb" devices connect without compromising security? Openwave Mobility's Aman Brar explains why cellular IoT, or CIoT, may be the solution.
Turning a profit drives a lot of cybercrime -- and IoT is becoming a huge target for cybercriminals. Anthony Giandomenico of Fortinet discusses.
Christopher Budd of Palo Alto Networks takes a look at the IoT-based Amnesia botnet, or as he calls it, "a Mirai that wasn't."
The internet of things is here -- and it's vulnerable. It's time to take security in IoT seriously; OIES Consulting CEO Francisco Maroto explains how.
One of the most effective ways of securing IoT, says Steve Woo of Rambus, is with a silicon-based hardware root of trust.
Digital IDs require an accurate, accessible and secure technology. Is blockchain the answer? Factom's Tiana Laurence explores the option.