5 CES-Inspired IoT Trends to Dominate in 2019

SERGE KOBA | April 18, 2019

article image
In the IoT world, 2018 was a year dominated by mergers, acquisitions, major vendor commitments and ever-increasing consumer adoption. In the business sphere, manufacturers showed signs of embracing IoT (i.e. Industrial IoT, or “IIoT”) as an enabling technology for everything from supply chain logistics to the creation of digital twins. As 2019 has now begun, we can see more emerging drivers of the Internet of Things. The big story for the next couple of years will be the rollout of 5G wireless networks, allowing end users to deploy significantly more IoT devices in more locations. As connectivity becomes faster and more reliable at the same time requiring less energy we can anticipate new ideas developed into viable solutions for every major business sphere.

Spotlight

nCipher Security

nCipher Security, an Entrust Datacard company and a leader in the general purpose hardware security module (HSM) market, empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications.

OTHER ARTICLES

Smart Building Initiatives are the Building Blocks of a Smart City

Article | April 8, 2020

To paraphrase a well-known saying, the journey to a complete smart city begins with a single building. No matter the size of the city, the extent of the technology or the most helpful use cases, a prospective smart city can integrate into — or branch off of — initiatives pushed forward by a smart building or campus. And when there is an increasing demand for these types of solutions, large corporations have the opportunity to improve corporate and social governance practices, as well as stand out in their community by championing more connected technologies.

Read More

AI + IoT = Automating and Analyzing Data Collection

Article | February 18, 2020

IoT is huge, but AI has the potential to supercharge the technology even more. Gartner predicts that this year 80 percent of all enterprise IoT projects will include AI. One area where many have been critical of IoT is a lack of good security. When coupled with AI, that could be improved, but some worry that AI can also be used as a tool to defeat IoT security. Dean Chester, cybersecurity author, wrote that “AI can be used for IoT security, or it can be used against it.”Melvin Greer, Chief Data Scientist, Intel Americas , said that “AI and IoT are no longer in separate swim lanes. AI closes the loop in an IoT environment where IoT devices gather or create data, and AI helps automate important choices and actions based on that data. Today, most organizations using IoT are only at the first ‘visibility’ phase where they can start to see what’s going on through IoT assets. But they’re moving toward the reliability, efficiency and production phases, which are more sophisticated and require stronger AI capabilities.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | March 13, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

Spotlight

nCipher Security

nCipher Security, an Entrust Datacard company and a leader in the general purpose hardware security module (HSM) market, empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications.

Events