People must feel safe and secure with the Internet of Things before it can reach its full potential – and there are a lot of things that still need to be addressed, Greenwave Systems’ chief scientist and technology evangelist Jim Hunter warned today. (more…)
November 15, 2016
Posted by: Avadhoot Patil
Canonical has released Ubuntu Core 16 for the Internet of Things (IoT), with regular and reliable security updates, and app stores for intelligent connected devices. (more…)
November 4, 2016
Posted by: Avadhoot Patil
The race to get new internet-connected products to market and jump on the IoT bandwagon is compromising security and putting customers’ personal data at risk, say security researchers at Context Information Security. (more…)
October 31, 2016
Posted by: Avadhoot Patil
The Internet of Things interconnects various devices and they all can store data. Any data residence is a potential threat to security and we have to address these issues carefully not giving a chance to cyber-attackers. With so many various devices in the internet of things, we have to be more versatile in terms of choosing the right protection measures, writes Alex Seryj, the editor in chief of QArea. (more…)
September 13, 2016
Posted by: George Malim
Trusted Objects is aiming to provide enhanced security to the Internet of Things (IoT) through its embedded firmware solution for LoRaWAN™ networks. (more…)
September 5, 2016
Posted by: Avadhoot Patil
In the first part of this two-part series, Tyco’s Simon Gawne examined the technical obstacles to a cyber-secure IoT-based security network. Here, he outlines the cultural changes which organisations must go through if they are to ensure that every entry point is effectively guarded. (more…)
September 1, 2016
Posted by: George Malim
The Internet of Things (IoT) is playing an increasingly large role in physical security, as perimeter-guarding devices such as CCTV and access management begin to take advantage of IP-based communications. Devices now have the power to share information faster than ever before and across a far wider physical area – but how secure are the security devices themselves? In a two-part series, Simon Gawne, director of integrated solutions and innovation at Tyco, investigates the need for security teams to consider not only the man outside the gate, but also the ghost in the machine, as hackers attempt to exploit vulnerable system backdoors. (more…)
August 31, 2016
Posted by: George Malim
From delivery vehicles to ATMs, air conditioning systems to CCTV cameras, the scope for commercial IoT appears to be as big, if not bigger than, the comparable consumer opportunity, writes Klaus Gheri, the vice president and general manager for network security at Barracuda Networks. However, for the business world, the IoT faces a major barrier to adoption: in their current state, the tools that help businesses deploy and secure IoT devices are simply not fit for purpose. (more…)
August 30, 2016
Posted by: George Malim
Infotecs, an international cyber security and threat intelligence platform provider, is combining Infotecs’s ViPNet technology with the credit card-sized Raspberry Pi mini PC. (more…)
August 17, 2016
Posted by: Avadhoot Patil
Infosec pros have spent the past decade fighting a rising tide of both more users and more devices connecting to enterprise resources while at the same time trying to decrease the attack surface — that is, trying to shut down as many points of access as possible, writes Joe Schorr is director of advanced security solutions at Bomgar. (more…)
July 18, 2016
Posted by: George Malim