WELCOME TO The THE INTERNET OF THINGS REPORT
Top IoT App Development Tools 2018
| August 22, 2018
Treycent apps enable you to create your own personal virtual assistant one voice command or question at a time.
Article | March 11, 2020
More than half of all internet of things (IoT) devices are vulnerable to medium- or high-severity attacks, meaning that enterprises are sitting on a “ticking IoT time bomb,” according to Palo Alto Networks Unit 42 research team. In new research released Tuesday, researchers said that several deep-rooted issues exist around connected devices, both used by general enterprises and in medical environments. At the most basic level researchers found that 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Other issues, like the reliance on outdated legacy protocols and operating systems, are opening up organizations up to older attack techniques that IT teams may not have had to deal with in years. For instance, researchers outlined one attack they discovered of a connected mammogram machine, used in a hospital, by the Conficker worm (malware first discovered more than a decade ago).
Article | February 26, 2020
The Internet of Things continues to grow fueled by applications that solve problems for enterprise customers. One of the biggest barriers to IoT solutions in enterprise settings is reliable and low-cost wireless connectivity. Where Wi-Fi, Bluetooth, LoRa, Zigbee and others have tried to solve the problem before, CBRS (Citizens Broadband Radio Service) is posed to offer a viable alternative for enterprise IoT connectivity. Specific to the United States, Citizen’s Broadband Radio Service (CBRS) is a piece of the radio spectrum between 3550 – 3700 MHz. This is a valuable area of the spectrum because it allows good propagation (ability to penetrate walls and go medium distances) with the benefits of higher bandwidth services, such as LTE and 5G.
Article | April 9, 2020
The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.
Article | February 12, 2020
Google announced that together with Amazon and Apple (the big 3 smart home players) they will work on the adoption of a joint wireless IoT standard for the smart home. This new connectivity standard is designed to make it easier for smart home products to work with each other.In the statement, Google said they were “joining Amazon, Apple and others to create Connected Home over IP, a new independent working group managed by the Zigbee Alliance (separate from the existing Zigbee 3.0/Pro protocol). We’re contributing two of our market-tested and open-source smart home technologies, Weave and Thread. Both are built on IP and have been integrated into millions of homes around the world.”
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE