Privacy and security in the Internet of Things: challenge or opportunity

The extent to which the Internet of Things (IoT) will develop depends on how all the data potentially collected is transformed into something useful and commercially viable, and on how cloud and predictive analytics will interact with the IoT-M2M ecosystems. The IoT value chain is long and complex and security should be monitored across all the components in the chain, in a way that makes it easier to detect liability in the event of a data breach or infringement of the security protocols. A security breach might originate from any one of multiple stakeholders, especially when considering M2M environments based on exchange of data among devices.

Spotlight

Security Innovation

Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on our assessment and training solutions to secure software wherever it runs. Our training solutions combine interactive modules, scenario-based labs, and hands-on cyber ranges to build skills that stick. Visit securityinnovation.com to learn how we can help you launch a best-in-class security program. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them.

OTHER WHITEPAPERS
news image

Tailoring IoT platforms to the requirements of specific use cases

whitePaper | April 13, 2021

The Internet of Things has evolved in the last 10-15 years from a long-term visionary idea to our current reality, present in more and more domains of our everyday lives. Many IoT architectures and platforms are being proposed today by various academic and industrial consortia, in domains as diverse as smart manufacturing, smart homes, smart cities or smart transport, to name just a few. These different IoT platforms have many things in common, as they all rely on connecting some smart sensor and actuator devices to each other and to the Internet, providing value-added services and applications to us, human users, either directly, or in an indirect manner. However, by closely analyzing their structure and operational focus, we can observe that these IoT architectures and platforms have also special features tailored to the requirements of different use cases.

Read More
news image

Businesses Prepare for ‘Hybrid’ Workforces with New Policies and Tech Infrastructure

whitePaper | January 12, 2022

TeamViewer commissioned an independent market research firm to survey a random sample of 200 managers, directors, VPs and higher working in the legal, finance, marketing, HR, customer support, sales, IT, and facilities departments of their organizations covering 13 different industries ranging from professional services to retail, travel and hospitality, and more. The study took place in February and March 2021, in partnership with TrendCandy research and Dynata, a global B2B panel provider.

Read More
news image

The IoT Trusted Zone

whitePaper | March 17, 2022

Among security best practices, system partitioning separates and isolates security-related hardware, software, and data in a “trusted zone” and tightly limits all attempts to access trusted content from outside the zone. Non-secure software cannot directly access secure resources. The Trusted Zone isolates security-related Microcontroller Unit (MCU) hardware, software, and external devices.

Read More
news image

Using eSIM and iSIM will save money for IoT deployments

whitePaper | June 22, 2022

Transforma Insights analysis points to an 8-13% saving to be made on lifetime connectivity spend by enterprises if they choose eSIM and iSIM options rather than removable plastic SIM cards for their IoT deployments. Embedded SIM (eSIM), and to a lesser extent its coming successor integrated SIM (iSIM), have established themselves as part of the range of capabilities that need to be carefully considered by an organisation when planning a cellular-based IoT solution. Alongside the physical components of eSIM and iSIM.

Read More
news image

Satellite based LoRa unlocks Europe-wide IoT

whitePaper | April 27, 2022

Big data is the dominant economic currency in a changing world moving at an increasingly accelerated pace. The speed and frequency with which data is collected, processed, and actioned is crucial to delivering the core promise of the Internet of Things (IoT) – either saving money through optimized operations or enabling new business models to generate new revenue streams.

Read More
news image

Industrial Internet of Thing

whitePaper | January 2, 2020

The brief report provides a positioning of developments in the area referred to as Industrial Internet of Things (IIoT) – loosely interpreting this as the industrial developments associated with the Internet of Things (IoT). IoT in turn describes the extension of the application of internet communications beyond computers and networked devices to also include the networking of everyday objects. In the context of industrial operations these objects are typically equipment, products and raw materials.

Read More

Spotlight

Security Innovation

Security Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on our assessment and training solutions to secure software wherever it runs. Our training solutions combine interactive modules, scenario-based labs, and hands-on cyber ranges to build skills that stick. Visit securityinnovation.com to learn how we can help you launch a best-in-class security program. Global technology vendors and enterprise IT organizations such as Microsoft, IBM, FedEx, ING, Symantec, Coca-Cola and GE rely on our expertise to understand the security risks in their software systems and facilitate the software and process change necessary to mitigate them.

Events