Cyberthreats in the Internet of Things

Event 24

On July 16, 2019, Nathan Salminen, Allison Holt, and Paul Otto from the Hogan Lovells Privacy and Cybersecurity and Litigation teams presented a webinar, “Cyberthreats in the Internet of Things” where they explored some techniques that can be used to exploit potential vulnerabilities in connected devices and how those types of events impact organizations from a regulatory and litigation perspective.
Watch Now

Spotlight

By offering low-latency and context-aware services, fog computing will have a peculiar role in the deployment of Internet of Things (IoT) applications for smart environments. Unlike the conventional remote cloud, for which consolidated architectures and deployment options exist, many design and implementation aspects remain open when considering the latest fog computing paradigm. In this paper, we focus on the problems of dynamically discovering the processing and storage resources distributed among fog nodes and, accordingly, orchestrating them for the provisioning of IoT services for smart environments.


OTHER ON-DEMAND WEBINARS

Social Impact of and on IoT

InterCall Solutions

Demographic, economic, and sociotechnical trends will influence the context of IoT deployments in the short and long run. Especially relevant will be continued population growth, the aging of the population and workforce, increased urbanization, continuing high rates of international migration, high rates of workforce disruption requiring retraining, jobs that are less tethered to particular locations, more leisure time, persistent income inequality, and continued concerns about security and personal safety.
Watch Now

Authentication for the Internet of Things

As IoT finds widespread applicability, organizations will need to carefully evaluate and streamline methods for device identity and authentication.
Watch Now

On-demand Webinar: Security in the IoT: Using PKI to securely connect and manage products

Xively by LogMeIn

Security is a primary concern for companies looking to connect and manage products. In a recent survey of product manufacturers who have an active IoT deployment, nearly half listed product security as a top challenge for their organization, outranking all other IoT challenges. Hear experts from Xively by LogMeIn and Leidos discuss key security concerns for IoT, with a specific focus on using Public Key Infrastructure (PKI) to secure IoT solutions.
Watch Now

Selling IoT to consumers

MarketSource

This webinar will focus on understanding the key trends in 2016 for the Internet of Things as it relates to each stage of the customer lifecycle. In each stage we will discuss the current market conditions as well as possible solutions to elevate the experience throughout the lifecycle.
Watch Now

Spotlight

By offering low-latency and context-aware services, fog computing will have a peculiar role in the deployment of Internet of Things (IoT) applications for smart environments. Unlike the conventional remote cloud, for which consolidated architectures and deployment options exist, many design and implementation aspects remain open when considering the latest fog computing paradigm. In this paper, we focus on the problems of dynamically discovering the processing and storage resources distributed among fog nodes and, accordingly, orchestrating them for the provisioning of IoT services for smart environments.

resources