Home Tags IoT device security
Tag: IoT device security
Remy Cricco, Chairman of the SIMalliance, explores why a standardised API enabling IoT devices to easily leverage the SIM to execute security services and store credentials will deliver scalability, simplicity and trust.
As consumers acquire and implement more interconnected IoT devices, the number of malfunctions is growing. After intensive corroboration with top research firms and internet service providers (ISPs), five distinct factors are projected to contribute to home-based IoT device failures in 2020. AI will be at the center of resolving this problem in the coming year.
This is a two part article. In the first part I demonstrate how an IoT device can incorporate a light weight blockchain on a camera device. In the second part I describe the need for open-source bodycams with law enforcement.
Today's home IoT devices are a security nightmare. Here are three simple ways that home users should protect themselves and the other devices connected to their home networks.
The pathetic security of many IoT devices has been well known for years, but in 2020, governmental actions like SB-327 are finally coming into place. But are they too little, too late?
As technology continues to advance, it's important for individuals and organizations to utilize IoT devices to increase productivity and profitability. Here are 5 IoT trends you can expect to see in 2020.
With the IoT global explosion already well underway, and the equally powerful increase in damaging hacks set to follow, the question is a serious one: Is it time for the federal government to get involved in forcing device manufacturers to up their security game? As expected, there are arguments on both sides of the issue.
As businesses invest in building IoT networks, they need to learn how to keep their information safe in the cloud. A few of these approaches include raising awareness and education about security risks and securing personal devices.
The number of IoT devices is increasing by the day. It has become extremely difficult to keep track of the devices people bring to work. This leads to the emergence of shadow IoT - the devices that the IT and security departments are completely unaware of. Because of these shadow devices, hackers can now exploit vulnerabilities much more easily than before. This article deals with the dangers and solutions to shadow IoT.
With a virtually infinite amount of devices in distributed enterprise environments, along with various venues for the IoT in differing industries, the network is now the focal point for its security. Through the network, users and devices can be authenticated, policies and rules put in place to control access and behavior, and visibility can be increased to detect anomalies. To make this truly work, security and network personnel must collaborate closely.