Search Results

Search results for: data security

IoT testing: How heavy emphasis on security can save your brand millions?

The Internet of Things interconnects various devices and they all can store data. Any data residence is a potential threat to security and we have to address these issues carefully not giving a chance to cyber-attackers. With so many various devices in the internet of things, we have to be more versatile in terms of choosing the right protection measures, writes Alex Seryj, the editor in chief of QArea. (more…)

Read more

September 13, 2016

Posted by: George Malim

Data protection and thecoming General Data Protection Regulation

Data protection is a fundamental concern to all organisations which hold personal information in the UK. Breaching the Data Protection Act (DPA) would have serious consequences for their business – fines, bad publicity and even criminal sanctions, writes James Wickes, the chief executive and co-founder of Cloudview. (more…)

Read more

September 6, 2016

Posted by: George Malim

The IoT and perimeter security: a hole in the wall? – Part Two

In the first part of this two-part series, Tyco’s Simon Gawne examined the technical obstacles to a cyber-secure IoT-based security network. Here, he outlines the cultural changes which organisations must go through if they are to ensure that every entry point is effectively guarded. (more…)

Read more

September 1, 2016

Posted by: George Malim

The IoT and perimeter security: a hole in the wall? – Part One

The Internet of Things (IoT) is playing an increasingly large role in physical security, as perimeter-guarding devices such as CCTV and access management begin to take advantage of IP-based communications. Devices now have the power to share information faster than ever before and across a far wider physical area – but how secure are the security devices themselves? In a two-part series, Simon Gawne, director of integrated solutions and innovation at Tyco, investigates the need for security teams to consider not only the man outside the gate, but also the ghost in the machine, as hackers attempt to exploit vulnerable system backdoors. (more…)

Read more

August 31, 2016

Posted by: George Malim

Re-engineering security for the IoT

From delivery vehicles to ATMs, air conditioning systems to CCTV cameras, the scope for commercial IoT appears to be as big, if not bigger than, the comparable consumer opportunity, writes Klaus Gheri, the vice president and general manager for network security at Barracuda Networks. However, for the business world, the IoT faces a major barrier to adoption: in their current state, the tools that help businesses deploy and secure IoT devices are simply not fit for purpose.  (more…)

Read more

August 30, 2016

Posted by: George Malim

Teradata Aster Analytics speeds time to value to benefit users of big data on Hadoop and AWS

Analytics solutions company, Teradata Corp., has announced new deployment options for Teradata Aster Analytics: Teradata Aster Analytics on Hadoop and Teradata Aster Analytics on Amazon Web Services (AWS). (more…)

Read more

August 26, 2016

Posted by: Avadhoot Patil

Ultra low latency and efficient peer-to-peer solutions bring enterprise grade security to the IoT

Infotecs, an international cyber security and threat intelligence platform provider, is combining Infotecs’s ViPNet technology with the credit card-sized Raspberry Pi mini PC. (more…)

Read more

August 17, 2016

Posted by: Avadhoot Patil

IoT security must be factored into business continuity plans

The Internet of Things (IoT) industry must establish a common set of security standards of which to adhere, writes Oscar Arean, the technical operations manager at disaster recovery provider Databarracks. (more…)

Read more

August 15, 2016

Posted by: George Malim

IoT data management issues are worrying UK consumer tech vendors

New research findings suggest that 78% of UK consumer technology and hardware vendors expect the Internet of Things (IoT) to have a significant impact on their ability to gather customer insight data across the supply chain. (more…)

Read more

August 11, 2016

Posted by: Avadhoot Patil

More haste, less speed – minimise the risks of IoT security

From smart thermostats to fitness trackers the race is on for companies to put out the next big connected product. However, during this foundation stage it’s essential that the companies developing or selling IoT technologies don’t take shortcuts when it comes to security protocol and ensure that the products they are selling do not pose any risk to the user’s security, writes Thomas Fischer, the principal threat researcher at Digital Guardian. (more…)

Read more

August 10, 2016

Posted by: George Malim