PRACTICAL SECURITY FOR THE INTERNET OF THINGS

|

article image
The IoT also promises to bring a variety of business benefits along with it, including increased efficiency across industries, cost savings in healthcare, safer infrastructure and more convenience in the home. Along with all of the advantages, however, the interconnectedness of the IoT brings real challenges for information security at all levels. The Internet of Things presents a variety of security issues because while current Internet security objectives deal with providing human users with access options, there are no human users in the IoT, meaning security objectives must be shifted to making reliable access decisions without human assistance.

Spotlight

Research NXT

Research NXT is a premium market research company covering in-depth research, insights and latest trends on Enterprise Technology for B2B sales and marketing leaders.

OTHER ARTICLES

WiFi for Enterprise IoT: Why You Shouldn’t Use It

Article | April 9, 2020

So you’re building an IoT solution and you’re ready to select your connectivity approach. Should you use Bluetooth? WiFi? LoRa? Cellular? Satellite? As I’ve explored in a previous post, the connectivity approach you choose ultimately comes down to the specific needs of your use case. Some use cases favor mobility and bandwidth, and power consumption doesn’t matter as much. Other use cases favor extensive battery life and broad coverage, and bandwidth doesn’t matter as much. In this post, I argue that for Enterprise IoT solutions, you shouldn’t use WiFi regardless of the use case. To build and implement a successful IoT solution, your connectivity needs to be reliable and consistent. When there’s an issue that needs troubleshooting, knowing that certain components of your IoT solution are reliable and consistent enables you to narrow your focus and address issues more effectively. There are many challenges in IoT, many of which stem from operational challenges and from having thousands of devices out in the real world where they’re subject to harsh, ever-changing environments.

Read More

WISeKey Drives Innovations in IoT Security with 23 Strategic Patents in the US

Article | April 9, 2020

WISeKey International Holding Ltd., cybersecurity delivering Integrated Security Platforms, announced that it has registered a total of 23 new strategic patents in US which are essential to the digital transformation applications that are fueling the growth in the IoT market.With a rich portfolio of more than 46 patent families, covering over 100 fundamental individual patents, and another 22 patents under review, WISeKey continues to expand its technology footprint in various domains including the design of secure chips, near field communication (NFC), the development of security firmware and backend software, the secure management of data, the improvement of security protocols between connected objects and advanced cryptography.

Read More

Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Article | April 9, 2020

Modern cars have dozens of computers on board, and they’re not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering, brakes, and the engine itself. This is why automotive cyber security is essential. If a vehicle’s computer systems aren’t properly protected, hackers can steal data or even take control of the vehicle. As you can imagine, that makes automotive cyber security a major concern for consumers, auto companies, and OEMs alike. But what is there to know about automotive cyber security? We’ll explore what cybersecurity in the automotive industry entails and what the biggest threats are to automotive IoT and connected vehicles. We’ll also share some insights from a recent webinar by Sectigo and Mentor Graphics on how to protect connected vehicles from emerging cybersecurity threats.

Read More

What Is IoT Forensics? Challenges Ahead and Best Tools to Use

Article | April 9, 2020

Internet of Things, generally known as IoT, is a network of objects or things. Embedded sensors help connect and exchange data with other objects via the internet. IoT is often related to the concept of smart homes, including devices like home security systems, cameras, lighting, refrigerators, etc. With all this data being transmitted over the internet, it is easy for the data to be modified, deleted, or stolen, which can lead to an invasion, theft, etc. IoT forensics plays a vital role in maintaining the integrity and security of the data being transmitted. Join us as we explore this fascinating web of devices and how you can get started in this vibrant field of forensics.

Read More

Spotlight

Research NXT

Research NXT is a premium market research company covering in-depth research, insights and latest trends on Enterprise Technology for B2B sales and marketing leaders.

Events