Security Archives

Security

Issues and advances in security related topics surrounding the Internet of Things

Getting IoT Technology Partnerships Right

No company can create an IoT solution alone, and vendors increasingly must form strategic partnerships that give them access to all necessary complementary technologies. An effective partnership will speed time to market for solutions that not only optimize the customer experience but also protect users and their personal data against growing cyber security threats while offering the scalability to support growth and changing requirements.

Top Six Insights for Successful IoT Product Development

Complex IoT solutions require more attention to product design details. Common mistakes companies make when they embark on an IoT product design project can delay or even cripple implementation.
Two people holding phones on a pink background of cash

Are “Invisible” Technologies the Key to IoT Payments in Retail?

Consumers seek easy, seamless experiences, without giving too much thought to the technology behind it. The payments industry should be delivering a frictionless customer experience that balances security and consumer expectations.

The Connected Classroom: How IoT Helps Schools with Education and Security

This article explores the IoT's role in classroom education and security. It focuses on how students and teachers can benefit from connected devices, as well as how schools can improve security with it.

IoT Application Security Challenges and Solutions

Though IoT applications offer a host of advantages which will surely cause a disruption in technology as we know it, it comes with a fresh set of challenges, which need to be addressed in order to make it work effectively.
A person using an iphone, a fingerprint, and the text "Certified"

How to Keep Company IoT Networks Secure

As businesses invest in building IoT networks, they need to learn how to keep their information safe in the cloud. A few of these approaches include raising awareness and education about security risks and securing personal devices.
a hand holding an iphone

How to Ensure IoT Security in a World That Cannot Be Trusted

The challenges surrounding IoT security remain today’s primary adoption rate inhibitor. Along with VPNs, a popular solution to today's IoT security challenge is found in software-defined perimeters (SDPs).
An arm with a smart watch on it casting a shadow

What Shadow IoT Is and How to Mitigate the Risk

The number of IoT devices is increasing by the day. It has become extremely difficult to keep track of the devices people bring to work. This leads to the emergence of shadow IoT - the devices that the IT and security departments are completely unaware of. Because of these shadow devices, hackers can now exploit vulnerabilities much more easily than before. This article deals with the dangers and solutions to shadow IoT.
Two robots and the text "cyberattack"

Back in the D.D.o.S.! How Not to Become a Russian Cyberattack Tool

Having an IoT device in your home makes your entire home network significantly more vulnerable to attack. Your devices may already be part of a botnet without you knowing it.
The text "Security" and a lock

Securing an IoT Solution? Start With the Network Layer

With a virtually infinite amount of devices in distributed enterprise environments, along with various venues for the IoT in differing industries, the network is now the focal point for its security. Through the network, users and devices can be authenticated, policies and rules put in place to control access and behavior, and visibility can be increased to detect anomalies. To make this truly work, security and network personnel must collaborate closely.

Popular

Resources