7 Steps to Success on the Internet of Things

Salesforce

The Internet of Things (IoT) is the Internet of Customers. It promises to evolve the way the world does business. However, understanding how to apply it to your company can be a mystery. Many businesses struggle with understanding the commercial uses or tend to get caught up in technology, resulting in solutions that fail to meet what customers are looking for.
Watch Now

Spotlight

Several video baby monitors from a cross-section of manufacturers were subjected to in-depth security testing; all of the devices under test exhibited several common security issues.The vulnerabilities are broken down according to "reach" – that is, if the issues are exploitable only with physical access to the device, if they are exploitable via the local network, or if they are exploitable from the Internet.


OTHER ON-DEMAND WEBINARS

Transforming Industrial Businesses with the Internet of Things

GENPACT

The Industrial Internet of things (IIoT) is set to revolutionize entire industries, from high tech (including computers and electronics) to medical technology.
Watch Now

Choosing a Security Solution for IoT platforms

Device Authority

In our earlier blog, we discussed the reasons why IoT Security needs a customer centric approach. This blog will follow on and explore the importance of having a strong device identity and integrity, which are the new perimeter for IoT.
Watch Now

Accelerate 18 - Securing IoT and OT systems in an evolving world: Similarities and difference

Fortinet

The Internet of Things (IoT) represents a new genus of the Internet, many refer to it as the digital disruption or the digital economy - but essentially delivering better ways to serve end users and generate new growth. Gartner projects there will be 20.4 Billion installed base of IoT units in 2020. Many of these will be headless, with little or no security installed on them and connecting to data centers and cloud. This exponential increase in IoT devices and their accessibility to the network will have considerable impact both on the connectivity needs as well as the security aspect of it. Indeed, cybersecurity is the top technology related challenge for IoT deployments. Similar to IoT, OT systems have their own challenges. Historically, these systems have been air-gapped and immune to remote hacking. However, the operational benefits of network connectivity have brought these systems to the Internet. Now, OT systems are increasingly becoming targets for malicious attacks due to their critical importance to our infrastructure and way of life. Join us to learn about the emerging IoT/OT landscape and how you can start securing the IoT and OT systems in your networks.
Watch Now

Electric Vehicles, the Smart Grid and the Internet of Things - How Everything will be Integrated in the Smart City of Tomorrow

IEEE

As a follow-up to his November 2014 presentation - Electric Vehicles and the Smart Grid - IEEE Internet of Things expert, Lee Stogner, will continue the discussion with an introduction to the Internet of Things. The Internet of Things is the Perfect Storm of advanced sensors, real time networks and massive data centers. Add to this combination of technology, new software applications that can process vast amounts of information at a cost not available just a few years ago. All of this will give government, industry and consumers the power to solve problems and create new clean industries.
Watch Now

Spotlight

Several video baby monitors from a cross-section of manufacturers were subjected to in-depth security testing; all of the devices under test exhibited several common security issues.The vulnerabilities are broken down according to "reach" – that is, if the issues are exploitable only with physical access to the device, if they are exploitable via the local network, or if they are exploitable from the Internet.

resources