Common Attacks on IoT Devices

The Linux Foundation

The importance of securing embedded devices has become clear to the whole industry as they started to play a bigger role in our daily lives in recent years. Up to now, it has been easy to compromise IoT devices such as vacuum robot, IP cameras, smart home devices, etc.
Watch Now

Spotlight

Increasingly, standard Internet technologies are finding their way into industrial control systems, displacing the purpose-built technologies historically used to build such systems. By enabling global access and applications such as advanced analytics, this trend is enabling industrial enterprises to improve business performance and production efficiencies by orders of magnitude. An industrial control system is a collection of devices (sensors, actuators, and controllers) that work together to sense, monitor and control something in the physical world. These systems are ubiquitous in the modern world and control much of the critical infrastructure around us dams, power plants, transportation systems, the electric grid, mining, chemical and manufacturing plants, commercial buildings, data centers and medical systems. The continuing explosion of connected devices provides opportunities for unparalleled growth and performance gains in industrial systems. They present unprecedented risks of hostile attacks to plant personnel, to society and the environment at large, and to the businesses that operate industrial processes.

OTHER ON-DEMAND WEBINARS

IoT for Track & Trace, with Google Cloud and Maps (Cloud Next '18)

leverege

At Google Cloud Next 2018, our CEO Eric Conn discussed common transportation and asset tracking use cases and challenges. Watch this breakout session with Fraser Macdonald, Product Manager at Google Cloud, to discover how Google Cloud IoT, Google Maps, and WAN technologies such as LoRa and cellular come together to create scalable track and trace solutions.
Watch Now

Industrial IoT and Intelligent Edge Connectivity

Moxa Inc

Learn how industrial IoT applications are changing the traditional polling architecture for SCADA and control systems into a modern publish/subscribe approach.
Watch Now

A Practical Approach to IoT in Field Service

Astea International, Inc.

Implementing IoT, accessing the data and proving its ROI is very challenging for most service organizations. In this webinar, Astea’s Director of Technology Michael Glaser, gives practical advice for deploying IoT in 3 stages: 1) Immediate Break-Fix, 2) Rules-based Proactive Service, and 3) Big Data-based Proactive Service. We also share best practices for integrating IoT with FSM software, so you can prove ROI before you invest in an IoT platform.
Watch Now

Utilizing Bluetooth LE Connectivity for the IoT and Mesh Applications

Infineon Technologies

Next-generation IoT applications require reliable Bluetooth LE connectivity to establish strong connections with sensor hubs and mobile applications. And with more and more processing being pushed to the edge, this cannot come at the sacrifice of performance.Learn how to get started quickly with copious code examples and documentation for Bluetooth LE data transfer applications.
Watch Now

Spotlight

Increasingly, standard Internet technologies are finding their way into industrial control systems, displacing the purpose-built technologies historically used to build such systems. By enabling global access and applications such as advanced analytics, this trend is enabling industrial enterprises to improve business performance and production efficiencies by orders of magnitude. An industrial control system is a collection of devices (sensors, actuators, and controllers) that work together to sense, monitor and control something in the physical world. These systems are ubiquitous in the modern world and control much of the critical infrastructure around us dams, power plants, transportation systems, the electric grid, mining, chemical and manufacturing plants, commercial buildings, data centers and medical systems. The continuing explosion of connected devices provides opportunities for unparalleled growth and performance gains in industrial systems. They present unprecedented risks of hostile attacks to plant personnel, to society and the environment at large, and to the businesses that operate industrial processes.

resources