Home Tech Security

Security

Issues and advances in security related topics surrounding the Internet of Things

Scaling-the-IoT-Data-and-AI-Summit-Part-Two

Scaling the IoT Data and AI Summit, Part Two

Ever spent time with people who were so smart that just being around them made you feel like a genius yourself? Welcome to Part Two...
Buyer-Beware-Security-Shackles-Creativity-for-IoT-Products

Buyer Beware: Security Shackles Creativity for IoT Products

At a recent Internet of Things (IoT) meetup hosted by Tech in Motion DC and General Assembly, three panelists spoke about 'things' development at...
Network-Access-Control-A-Paramount-for-the-Cybersecurity-Industry

Network Access Control: A Paramount for the Cybersecurity Industry

As organizations are increasingly focusing on interoperability and information sharing, IoT devices, virtual servers/cloud services, routers, switches, firewalls, and bring-your-own-device (BYOD) are being flocked...
Fooling-facial-recognition

Fooling Facial Recognition

In light of recent news from Apple, facial recognition technology is now the talk of the town. Ranging from privacy concerns to a curious...

BlueBorne and The Billion Dollar IoT Device Discovery Opportunity

Last week, Armis Labs identified a new attack vector, dubbed "BlueBorne", that targets any device with Bluetooth capability. This includes mobile, desktop, and IoT...
iot connectivity

Competition in IoT Connectivity Space Heats Up as Helium Enters LPWAN Fray

Back in April we shared a post on IoT connectivity -- comparing LoRa, SigFox, RPMA, and other LPWAN technologies. As new players make their...
iot security

Preventing IoT Hacking – Takeaways from 3 IoT Security White Papers

IoT security is often perceived as a hotbed of failures. However, extensive progress is being made in the field and a multitude of companies...

Surviving the IoT Cyber Attack Pandemic

"The Internet of Things is turning into a security nightmare." So wrote Thomas Ricker, a respected systems engineer and deputy editor of the The Verge,...
Secure Connectivity - Why It's Important and How to Implement It

Secure Connectivity – Why It’s Important and How to Implement It

For many people, talking about security is about as interesting as a trip to the dentist. So why should you care about security? If you...
A Human-Centric Trust Model for the Internet of Things

A Human-Centric Trust Model for the Internet of Things

For IoT security to be successful, humans must trust the security, safety, and privacy of this massive transformation of the world. Most importantly, “ordinary...

Trending

More Content