Home Tags Iot security
Tag: iot security
CoreKinect will integrate Kudelski’s IoT Security Platform with their custom, purpose-built sensor and tracking solution. End-user companies will benefit from innovative devices delivered quickly to their specific requirements and with strong, built-in identity, privacy, authenticity and tamper-resistance. The Kudelski/CoreKinect solution will enable new IoT applications like cold chain monitoring and pharmaceutical authenticity in a small, compact, and flexible form factor.
While network security is crucial for enterprise IoT solutions, and breaches can cost millions and cause widespread damage, smart home security vulnerabilities can have terrifying consequences. There are a range of plug n’ play security options available to smart home owners. The best we’ve come across is Trend Micro’s Home Network Security solution.
Major Incidents occur on a daily basis across all industry types. IoT provides an innovative platform enabling a consistent workflow process which will handle major incidents in a manner that reduces their adverse consequences.
With continuous advances in IoT, people’s lives are becoming more connected, easier and better. Our commitment to IoT security must grow with the trend.
This 2nd installment in our series on smart city privacy explores how two of the earliest cities, Çatalhöyük and Jericho, navigated urban privacy issues.
This post discusses 8 worst data breaches of 2018. The lesson? Ignoring insider threats is costly, and identifying early indicators can limit their impact.
IoT has become embroiled in controversy related to security issues in 2019. The most common threats involve hijacking, leaks and unsecured devices.
IoT device security has some inherent vulnerabilities. The solution is up to IoT developers and manufacturers. We need security standards.
It’s amazing all the things you can do with IoT devices and smart assistants. Sadly though, many IoT devices aren’t very secure. There's a lot of concern about what...
IoT can extend an abusive person's reach manifold. Only by combining the social with the technological can we address this alarming risk.