Achieving End-to-End Security in the Internet of Things Why it’s time to embrace carrier-grade Cellular IoT

| March 1, 2016

article image
The new realm of possibilities enabled by The Internet of Things (IoT) arrives tempered with security concerns. Introduce millions of IP-enabled objects to the network, and you also expose a proportional number of vulnerabilities. The media delivers a steady stream of news coverage about hackers taking control of end devices in the IoT network, including cars, refrigerators, baby monitors, and webcams. These incidents typically involve consumer devices that connect over Wi-Fi networks with user-configured password policies. The reality is that IoT security issues extend well beyond the end device.

Spotlight

SanDisk

SanDisk®, a Western Digital brand, has been expanding the possibilities of data storage for more than 25 years—giving businesses and consumers the peace of mind that comes from knowing their data is readily available and reliable, even in the most challenging environments. Our products are used in the world's leading-edge data centers, embedded in game-changing smartphones, tablets, and laptops, and entrusted by consumers around the world.

OTHER ARTICLES

More Than Half of IoT Devices Vulnerable to Severe Attacks

Article | March 11, 2020

More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).

Read More

Building a Cold Chain Management IoT Solution

Article | February 27, 2020

Artificial intelligence (AI) has existed in the public consciousness for decades. The (mostly) sentient machines playing the villains in Hollywood movies have never been realistic depictions of the technology, but they have left an impression, nonetheless. AI has proved as exciting to the layman as it is to the expert. Usually based in remote data centers, AI is capable of collecting and examining immense volumes of data, generating insights based on analytical algorithms. With varying degrees of autonomy, these capabilities have been put to use streamlining decision-making processes. While AI is often thought of as a product in its own right, it is increasingly intersecting with other parallel trends. Chief among these is the Internet of things (IoT), which enables previously isolated machines to “talk” to one another and, at the same time, generate data that makes new modes of operation a possibility.

Read More

Practical AI – A Serious Issue for Industrial IoT

Article | February 28, 2020

While the Industrial Internet of Things (IIoT) is maturing rapidly, there’s often a strong link to Artificial intelligence (AI) and Machine Learning (ML) tools to manage data flows. This raises a host of challenges including connectivity, security, storage and modeling requirements. Designers of IIoT devices and larger deployments must build in contingencies for shifts in these areas or risk falling short. While IIoT is gaining in maturity, the overall market still has many challenges to overcome. Some of these challenges are technical barriers to IoT device operation, such as connectivity standards and battery technology, but the picture is even wider than that. The world of IIoT not only requires IoT hardware to operate reliably and efficiently in all environments but also relies on supporting networks and services too. The result is that IIoT deployments cannot be viewed as isolated technology upgrades or productivity drives, but highly interconnected ecosystems sensitive to a wide range of variables – in particular the developing world of AI.

Read More

How to Leverage IoT to Protect Your Workers

Article | March 20, 2020

Workers in construction, agriculture and manufacturing are reported to have the highest incident rates, according to the 2018 research of the US Bureau of Labor Statistics. Medical expenses for work-related injuries are scoring millions of dollars each year. In recent years, businesses have increasingly opted for industrial IoT solutions that offer advanced monitoring capabilities designed to predict and prevent incidents. In many situations, smart monitoring can save lives in the event of equipment misuse or failure, inefficient safety regulations and health-threatening sites.

Read More

Spotlight

SanDisk

SanDisk®, a Western Digital brand, has been expanding the possibilities of data storage for more than 25 years—giving businesses and consumers the peace of mind that comes from knowing their data is readily available and reliable, even in the most challenging environments. Our products are used in the world's leading-edge data centers, embedded in game-changing smartphones, tablets, and laptops, and entrusted by consumers around the world.

Events