New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Internet of Things (IoT) Security Strategy News
April 18, 2018
Azure Sphere extends security from the cloud to the device. It's the most holistic approach on the market and provides another example of Microsoft abandoning its insular past.
March 27, 2018
MIT researchers have developed an energy-efficient, hard-wired chip that they say will benefit IoT encryption and ease authentication processes in the IoT environment.
March 12, 2018
In a new document, the Industrial Internet Consortium abridges IEC and NIST publications, offering clear, concise guidance to ensure IIoT security in connected plants.
August 04, 2017
News roundup: U.S. Senators introduce a bipartisan bill to standardize IoT device security for government vendors. Plus, Anthem suffers another data breach, and more.
Internet of Things (IoT) Security Strategy Get Started
Bring yourself up to speed with our introductory content
Creating value from IoT while ensuring a safe and satisfactory user experience is not an easy task. oneM2M's Dr. Omar Elloumi explains why interoperability between verticals and vendors is critical. Continue Reading
Geisel Software's Brian Geisel explains why prioritizing security in IoT is critical for manufacturers and consumers alike. Continue Reading
As enterprises adopt IoT devices and manufacturers develop enterprise tools, there is a shared responsibility to ensure data is fortified against attacks. Continue Reading
Evaluate Internet of Things (IoT) Security Strategy Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Manufacturers, service providers and consumers need to protect their connected devices, IP and sensitive data. Trustonic's Richard Hayton explains how trusted execution environments can help. Continue Reading
Security cameras are visual sensors by nature, so why not add analytics and benefit further? Cisco Meraki's George Bentinck offers advice on adopting IP-enabled security cameras. Continue Reading
PKI can be used to secure IoT devices during the manufacturing process -- its supply chain as well as the distribution and delivery process. GlobalSign's Nisarg Desai discusses. Continue Reading
Manage Internet of Things (IoT) Security Strategy
Learn to apply best practices and optimize your operations.
Though there are several recommended properties for built-in security, says NCP engineering's Julian Weinberger, encrypting communications with VPNs is essential. Continue Reading
While IoT has revolutionized healthcare, says Netscout's Eileen Haggerty, expanding threats and increasingly innovative tech make the need for complete visibility and service assurance critical. Continue Reading
Behavioral eManipulation, explains Independent Security Evaluators' Ted Harrington, is an attack methodology in which attackers use technical exploits to influence human behavior. Continue Reading
Problem Solve Internet of Things (IoT) Security Strategy Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Why has healthcare struggled to make IoT safe? MOBI's Josh Garrett discusses two primary healthcare IoT challenges: device manufacturer priorities and network access security. Continue Reading
IoT growth is estimated to be tremendous. However, meeting the need for IoT security controls, says Cytellix's Brian Berger, will be a massive undertaking. Continue Reading
Combining a software-defined perimeter with blockchain is an ideal way to secure autonomous vehicles. Movimento Group's Mahbubul Alam explains. Continue Reading