IoT For All | The best content, news, and resources for IoT
Home Blog
a hand holding an iphone
The challenges surrounding IoT security remain today’s primary adoption rate inhibitor. Along with VPNs, a popular solution to today's IoT security challenge is found in software-defined perimeters (SDPs).
An arm with a smart watch on it casting a shadow
The number of IoT devices is increasing by the day. It has become extremely difficult to keep track of the devices people bring to work. This leads to the emergence of shadow IoT - the devices that the IT and security departments are completely unaware of. Because of these shadow devices, hackers can now exploit vulnerabilities much more easily than before. This article deals with the dangers and solutions to shadow IoT.
New research from Kollective explores the challenges with scaling and maintaining large-scale IoT networks
Press Release
Itron and Xcel Energy entered an agreement to secure smart meters that will allow for collaboration to improve customer experience and utility operations using the distributed intelligence capabilities of Itron’s IoT solution. Xcel Energy provides electricity and natural gas service to millions of customers in Minnesota, Michigan, Wisconsin, North Dakota, South Dakota, Colorado, Texas and New Mexico.
In a new, follow-up cybersecurity study of network attached storage (NAS) systems and routers since 2013, consulting and research firm Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming an industrywide problem of a lack of basic security diligence.
Two robots and the text "cyberattack"
Having an IoT device in your home makes your entire home network significantly more vulnerable to attack. Your devices may already be part of a botnet without you knowing it.
A desktop and phone screen with analytics graphs
IoT is advancing building automation beyond mere optimizations. It's bringing systems together and adding new value, through innovations like demand control and the way it improves air quality. But we must remember that IoT-based analytics platforms work only because they connect people with technology—without humans at the helm, they’re of little value.
The text "Security" and a lock
With a virtually infinite amount of devices in distributed enterprise environments, along with various venues for the IoT in differing industries, the network is now the focal point for its security. Through the network, users and devices can be authenticated, policies and rules put in place to control access and behavior, and visibility can be increased to detect anomalies. To make this truly work, security and network personnel must collaborate closely.
Press Release
Leading technical distributor of industrial products experiences 30% increase in productivity, with millions of dollars in cost savings, after implementing IoT Express reorder buttons
A robot on a colorful background
IoT networks can both amplify and be the targets of distributed denial of service (DDoS) or botnet attacks. Architect resilient solutions.

Trending

Explore