How To Protect Your Users and Your Bottom Line

| June 27, 2019

article image
The number of devices connected to the Internet of Things (IoT) is expected to reach 55 billion by 2025. Compare this to the 9 billion such devices in 2017, and you can see how quickly the number of IoT devices is growing. It is also estimated that the global IoT market will grow from $151 billion in 2018 to $1.567 trillion by 2025. Growth will be driven by the development of new IoT appliances, the movement of more data to the cloud, and increased usage of IoT devices.

Spotlight

CyberX Labs

CyberX provides the most widely deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Deployed in the world's largest environments and backed by military-grade cyber experts from the IDF, the CyberX platform uniquely combines M2M behavioral analytics with proprietary ICS-specific threat intelligence to identity advanced cyberattacks in real-time.

OTHER ARTICLES

Smart Submeters And Their Key Benefits

Article | February 14, 2020

Energy management and efficiency utilization are the challenges for building owners, facility managers, and tenants. With the traditional metering solutions, building owners can’t measure accurate consumptions, usage patterns, and downtimes. It is simple: You can’t manage if you can’t measure. Building owners and tenants have been speculating about bettering and changing their approach to optimize energy consumption by deploying smart submeters. In contrast to traditional electrical meter, a smart submeter is infused with network connectivity features to upload the data. They track, monitor, measure, and upload data to servers for real-time visibility. Earlier building owners used to bill according to the space occupied by the tenants. Think about inaccurate billing – have you ever seen a bill that confused you?

Read More

More Than Half of IoT Devices Vulnerable to Severe Attacks

Article | February 14, 2020

More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).

Read More

Arm Unveils AI, ML Chips for IoT and Edge

Article | February 14, 2020

Arm wants to help IoT and other embedded devices to think for themselves. Today the company unveiled two chips designed to eliminate the reliance on cloud-based artificial intelligence (AI) by delivering machine learning (ML) capabilities right on the device.“Enabling AI everywhere requires device makers and developers to deliver machine learning locally on billions and ultimately trillions of devices,” said Dipti Vachani, SVP and general manager of Arm’s automotive and IoT line of business, in a statement. The Cortex-M55 processor is the company’s first to leverage the Armv8.1-M architecture and features Arm’s Helium vector processing technology, which is designed with ML and digital signal processing in mind.

Read More

IoT Standards and Protocols Explained

Article | February 14, 2020

For businesses, the transformative power of IoT is increasingly significant with the promise of improving operational efficiency and visibility, while reducing costs. However, IoT does not come without risks and challenges. While concerns over security and data privacy continue to rise, the lack of IoT standards remains one of the biggest hurdles. The increasing number of legacy, single-vendor, and proprietary solutions cause problems with disparate systems, data silos and security gaps. As IoT successes become more dependent on seamless interoperability and data-sharing among different systems, we want to avoid the scenario of a fragmented market with numerous solutions that simply don’t work with each other.

Read More

Spotlight

CyberX Labs

CyberX provides the most widely deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Deployed in the world's largest environments and backed by military-grade cyber experts from the IDF, the CyberX platform uniquely combines M2M behavioral analytics with proprietary ICS-specific threat intelligence to identity advanced cyberattacks in real-time.

Events