IT & Security Archives
Home Industry IT & Security

IT & Security

Securing IIoT and IT Devices to Protect Operational Technology

Industrial IoT, or IIoT, has evolved over the past couple of years, causing concern over the security of the devices. Trevor dives into some of the challenges of operational technology (OT) solution security, understanding how to monitor OT devices and how behavioral analytics address OT device risks.

Hardware Threats to an IoT Ecosystem

The integrity of IoT hardware is paramount to the success of a solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous.

IoT Device Security is Not One-and-Done

This article covers five common areas of IoT device security you should consider and how open source projects and services can help you maintain security best practices.

5 Ways to Secure Your IoT Devices—Before They Get Hacked

A brief overview of ways to protect your IoT devices from hackers before you start using them. The article touches on two-factor authentication, the importance of routinely updating your devices, and why you should disable UPnP features—just to name a few.

IoT Application Security Challenges and Solutions

Though IoT applications offer a host of advantages which will surely cause a disruption in technology as we know it, it comes with a fresh set of challenges, which need to be addressed in order to make it work effectively.
A person using an iphone, a fingerprint, and the text "Certified"

How to Keep Company IoT Networks Secure

As businesses invest in building IoT networks, they need to learn how to keep their information safe in the cloud. A few of these approaches include raising awareness and education about security risks and securing personal devices.
Two construction workers

Implications of IoT Security in Construction Use Cases

Security is one of the most important areas in IoT. It is a major topic for discussion within organizations in the construction industry.
A security guard and a security shield

How to Keep Your Networked Devices Safe From Hackers

If a hacker finds your old smart bulb in the trash, they could access important personal data. Learn the risks to secure your networks.
Stack of coins with a sign behind them

Making IoT Data Valuable

Firms can make IoT data more valuable asset by building data pipelines that make data more available and easier to use in analytics. This article will present how companies can make IoT data a better performing asset.
Laptop computer with overlaying colors

The Cyber Insurance Industry’s Plans Are Based on Yours

Industries that have yet to make appropriate security changes should take inspiration from the insurance industry and formulate a detection and response strategy.

Popular

Resources