John Chambers Introduces the Internet of Things World Forum

JOHN CHAMBERS | March 1, 2016

article image
Find out why Cisco Chairman and CEO John Chambers is excited for the inaugural Internet of Things World Forum hosted by Cisco in

Spotlight

Cubilog

Cubilog is a cloud based automation platform with the purpose to give total control to the user over any brand of smart device. Cubilog is able to integrate all existing protocols and devices (smart/connected and “dumb”/wired devices too) into one easy-to-use cloud based software with a cross platform user interface. The hardware covers all existing communication protocols for easy device integration. With Cubilog’s dashboard the user can customize and control the devices and create rules and schedules for automation.

OTHER ARTICLES

IoT: Quench the thirst for smart water management

Article | April 7, 2020

Water is one of our most precious resources. Yet every year, we lose more than 126 million cubic meters globally to leaks, poor metering and theft. Beyond that is the energy wasted moving water that never gets used. It adds up to staggering economic – and environmental – costs. It also presents one of the most compelling opportunities to use industrial IoT solutions. Water utilities can use IoT to address two fundamental aspects of water management: maintaining the physical infrastructure and addressing water safety and sustainability. With IoT sensors throughout a water utility’s infrastructure, it becomes possible to. In many ways, these uses mirror what’s possible in manufacturing. But while factory floors are condensed environments – with all assets located in a confined area – water utilities operate highly distributed environments. Reservoirs, pipes, pumps and other assets are spread across a massive physical footprint. Such environments introduce some unique challenges. One of the most pressing is cost. Capturing data across a massive infrastructure – and moving it to the enterprise and/or cloud – is a heavy lift. That’s especially true when considering the criticality of timely transmission and analysis of water data. Any delay can contribute to continued losses.

Read More

More Than Half of IoT Devices Vulnerable to Severe Attacks

Article | March 11, 2020

More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Hitachi, Infineon promote IoT tech for viral detection

Article | April 16, 2020

Tech companies are stepping up Internet of Things technologies to protect against COVID-19 and future viruses by using LiDAR and infrared cameras to detect a person’s body temperature from a distance or even handwashing. Keeping the data secure in such detection is also going to be a challenge. One approach is to put a chip inside an IoT device when it is manufactured to enable strong authentication and secure communication, mainly to guard against device counterfeiting. Hitachi Vantara has touted forward looking infrared cameras (FLIR) cameras to detect the temperature of a person from a distance. That way a passenger on a train or a worker or a customer in a store can be non-intrusively screened, according to a blog from Mark Jules, global vice president of smart spaces and video intelligence.

Read More

Spotlight

Cubilog

Cubilog is a cloud based automation platform with the purpose to give total control to the user over any brand of smart device. Cubilog is able to integrate all existing protocols and devices (smart/connected and “dumb”/wired devices too) into one easy-to-use cloud based software with a cross platform user interface. The hardware covers all existing communication protocols for easy device integration. With Cubilog’s dashboard the user can customize and control the devices and create rules and schedules for automation.

Events