The challenges surrounding IoT security remain today’s primary adoption rate inhibitor. Along with VPNs, a popular solution to today's IoT security challenge is found in software-defined perimeters (SDPs).
The number of IoT devices is increasing by the day. It has become extremely difficult to keep track of the devices people bring to work. This leads to the emergence of shadow IoT - the devices that the IT and security departments are completely unaware of. Because of these shadow devices, hackers can now exploit vulnerabilities much more easily than before. This article deals with the dangers and solutions to shadow IoT.
IoT For All -
New research from Kollective explores the challenges with scaling and maintaining large-scale IoT networks
Itron and Xcel Energy entered an agreement to secure smart meters that will allow for collaboration to improve customer experience and utility operations using the distributed intelligence capabilities of Itron’s IoT solution. Xcel Energy provides electricity and natural gas service to millions of customers in Minnesota, Michigan, Wisconsin, North Dakota, South Dakota, Colorado, Texas and New Mexico.
IoT Manufacturers Missed More than 100 Vulnerabilities in Devices Evaluated, According to New Research from Independent Security EvaluatorsIoT For All -
In a new, follow-up cybersecurity study of network attached storage (NAS) systems and routers since 2013, consulting and research firm Independent Security Evaluators (ISE) found 125 vulnerabilities in 13 IoT devices, reaffirming an industrywide problem of a lack of basic security diligence.
Having an IoT device in your home makes your entire home network significantly more vulnerable to attack. Your devices may already be part of a botnet without you knowing it.
IoT is advancing building automation beyond mere optimizations. It's bringing systems together and adding new value, through innovations like demand control and the way it improves air quality. But we must remember that IoT-based analytics platforms work only because they connect people with technology—without humans at the helm, they’re of little value.
With a virtually infinite amount of devices in distributed enterprise environments, along with various venues for the IoT in differing industries, the network is now the focal point for its security. Through the network, users and devices can be authenticated, policies and rules put in place to control access and behavior, and visibility can be increased to detect anomalies. To make this truly work, security and network personnel must collaborate closely.
Leading technical distributor of industrial products experiences 30% increase in productivity, with millions of dollars in cost savings, after implementing IoT Express reorder buttons
IoT networks can both amplify and be the targets of distributed denial of service (DDoS) or botnet attacks. Architect resilient solutions.