Guest Writer, Author at IoT For All | Page 3 of 44

Guest Writer

Guest writers who are especially keen on exploring IoT and related technologies, whether from an enterprise or a cultural/social perspective, occasionally share their insights with the IoT industry through IoT For All. If you're interested in being featured as a guest writer, submit your article through this portal, and we'll get back to you within one week.

How Bluetooth Could Revolutionize IIoT

Could something as simple as Bluetooth adoption lead the way to a smarter IIoT?

Accelerating Automotive into the Digital Future

There's mounting pressure in the automotive industry to transform from mechanical-centric into software-defined vehicles. Manufacturers and suppliers will have to implement innovative software-based solutions to stay relevant and to keep up with consumers’ expectations.

How to Ensure IoT Security in a World That Cannot Be Trusted

The challenges surrounding IoT security remain today’s primary adoption rate inhibitor. Along with VPNs, a popular solution to today's IoT security challenge is found in software-defined perimeters (SDPs).

What Shadow IoT Is and How to Mitigate the Risk

The number of IoT devices is increasing by the day. It has become extremely difficult to keep track of the devices people bring to work. This leads to the emergence of shadow IoT - the devices that the IT and security departments are completely unaware of. Because of these shadow devices, hackers can now exploit vulnerabilities much more easily than before. This article deals with the dangers and solutions to shadow IoT.

Back in the D.D.o.S.! How Not to Become a Russian Cyberattack Tool

Having an IoT device in your home makes your entire home network significantly more vulnerable to attack. Your devices may already be part of a botnet without you knowing it.

Securing an IoT Solution? Start With the Network Layer

With a virtually infinite amount of devices in distributed enterprise environments, along with various venues for the IoT in differing industries, the network is now the focal point for its security. Through the network, users and devices can be authenticated, policies and rules put in place to control access and behavior, and visibility can be increased to detect anomalies. To make this truly work, security and network personnel must collaborate closely.