security measures Archives | IoT For All
Home Tags Security measures

Tag: security measures

IoT and Cyber-Security – How the Two Should Intertwine for Your Business

The article dives deep into various scenarios of data encryption protocols within corporate IoT networks to accommodate ever-changing demands for cybersecurity for businesses in different industries.

Making IoT Scalable, Simpler and SAFEr

Remy Cricco, Chairman of the SIMalliance, explores why a standardised API enabling IoT devices to easily leverage the SIM to execute security services and store credentials will deliver scalability, simplicity and trust.

Six Tips to Secure Your IoT Devices This Holiday Season

6 tips from NETSCOUT's Chief Security Officer on how consumers can secure their IoT devices this holiday season.

Improving Your Home IoT Device Security

Today's home IoT devices are a security nightmare. Here are three simple ways that home users should protect themselves and the other devices connected to their home networks.

IoT Regulation: Too Little? Too Late?

The pathetic security of many IoT devices has been well known for years, but in 2020, governmental actions like SB-327 are finally coming into place. But are they too little, too late?

Security Standards for IoT & the Government’s Approach

With the IoT global explosion already well underway, and the equally powerful increase in damaging hacks set to follow, the question is a serious one: Is it time for the federal government to get involved in forcing device manufacturers to up their security game? As expected, there are arguments on both sides of the issue.

Getting IoT Technology Partnerships Right

No company can create an IoT solution alone, and vendors increasingly must form strategic partnerships that give them access to all necessary complementary technologies. An effective partnership will speed time to market for solutions that not only optimize the customer experience but also protect users and their personal data against growing cyber security threats while offering the scalability to support growth and changing requirements.
A person using an iphone, a fingerprint, and the text "Certified"

How to Keep Company IoT Networks Secure

As businesses invest in building IoT networks, they need to learn how to keep their information safe in the cloud. A few of these approaches include raising awareness and education about security risks and securing personal devices.
An arm with a smart watch on it casting a shadow

What Shadow IoT Is and How to Mitigate the Risk

The number of IoT devices is increasing by the day. It has become extremely difficult to keep track of the devices people bring to work. This leads to the emergence of shadow IoT - the devices that the IT and security departments are completely unaware of. Because of these shadow devices, hackers can now exploit vulnerabilities much more easily than before. This article deals with the dangers and solutions to shadow IoT.
A heart and a brain on an abstract background

The Blood, Heart and Brain of the Smart City

It’s important to look at the driving forces behind the smart city and how personal data dovetails with these to generate a fuller picture of what it means to live in a smart city.