The Internet of Things interconnects various devices and they all can store data. Any data residence is a potential threat to security and we have to address these issues carefully not giving a chance to cyber-attackers. With so many various devices in the internet of things, we have to be more versatile in terms of choosing the right protection measures, writes Alex Seryj, the editor in chief of QArea. (more…)
September 13, 2016
Posted by: George Malim
Data protection is a fundamental concern to all organisations which hold personal information in the UK. Breaching the Data Protection Act (DPA) would have serious consequences for their business – fines, bad publicity and even criminal sanctions, writes James Wickes, the chief executive and co-founder of Cloudview. (more…)
September 6, 2016
Posted by: George Malim
In the first part of this two-part series, Tyco’s Simon Gawne examined the technical obstacles to a cyber-secure IoT-based security network. Here, he outlines the cultural changes which organisations must go through if they are to ensure that every entry point is effectively guarded. (more…)
September 1, 2016
Posted by: George Malim
The Internet of Things (IoT) is playing an increasingly large role in physical security, as perimeter-guarding devices such as CCTV and access management begin to take advantage of IP-based communications. Devices now have the power to share information faster than ever before and across a far wider physical area – but how secure are the security devices themselves? In a two-part series, Simon Gawne, director of integrated solutions and innovation at Tyco, investigates the need for security teams to consider not only the man outside the gate, but also the ghost in the machine, as hackers attempt to exploit vulnerable system backdoors. (more…)
August 31, 2016
Posted by: George Malim
From delivery vehicles to ATMs, air conditioning systems to CCTV cameras, the scope for commercial IoT appears to be as big, if not bigger than, the comparable consumer opportunity, writes Klaus Gheri, the vice president and general manager for network security at Barracuda Networks. However, for the business world, the IoT faces a major barrier to adoption: in their current state, the tools that help businesses deploy and secure IoT devices are simply not fit for purpose. (more…)
August 30, 2016
Posted by: George Malim
Analytics solutions company, Teradata Corp., has announced new deployment options for Teradata Aster Analytics: Teradata Aster Analytics on Hadoop and Teradata Aster Analytics on Amazon Web Services (AWS). (more…)
August 26, 2016
Posted by: Avadhoot Patil
Infotecs, an international cyber security and threat intelligence platform provider, is combining Infotecs’s ViPNet technology with the credit card-sized Raspberry Pi mini PC. (more…)
August 17, 2016
Posted by: Avadhoot Patil
The Internet of Things (IoT) industry must establish a common set of security standards of which to adhere, writes Oscar Arean, the technical operations manager at disaster recovery provider Databarracks. (more…)
August 15, 2016
Posted by: George Malim
New research findings suggest that 78% of UK consumer technology and hardware vendors expect the Internet of Things (IoT) to have a significant impact on their ability to gather customer insight data across the supply chain. (more…)
August 11, 2016
Posted by: Avadhoot Patil
From smart thermostats to fitness trackers the race is on for companies to put out the next big connected product. However, during this foundation stage it’s essential that the companies developing or selling IoT technologies don’t take shortcuts when it comes to security protocol and ensure that the products they are selling do not pose any risk to the user’s security, writes Thomas Fischer, the principal threat researcher at Digital Guardian. (more…)
August 10, 2016
Posted by: George Malim