Home Tags Security measures
Tag: security measures
The article dives deep into various scenarios of data encryption protocols within corporate IoT networks to accommodate ever-changing demands for cybersecurity for businesses in different industries.
Remy Cricco, Chairman of the SIMalliance, explores why a standardised API enabling IoT devices to easily leverage the SIM to execute security services and store credentials will deliver scalability, simplicity and trust.
6 tips from NETSCOUT's Chief Security Officer on how consumers can secure their IoT devices this holiday season.
Today's home IoT devices are a security nightmare. Here are three simple ways that home users should protect themselves and the other devices connected to their home networks.
The pathetic security of many IoT devices has been well known for years, but in 2020, governmental actions like SB-327 are finally coming into place. But are they too little, too late?
With the IoT global explosion already well underway, and the equally powerful increase in damaging hacks set to follow, the question is a serious one: Is it time for the federal government to get involved in forcing device manufacturers to up their security game? As expected, there are arguments on both sides of the issue.
No company can create an IoT solution alone, and vendors increasingly must form strategic partnerships that give them access to all necessary complementary technologies. An effective partnership will speed time to market for solutions that not only optimize the customer experience but also protect users and their personal data against growing cyber security threats while offering the scalability to support growth and changing requirements.
As businesses invest in building IoT networks, they need to learn how to keep their information safe in the cloud. A few of these approaches include raising awareness and education about security risks and securing personal devices.
The number of IoT devices is increasing by the day. It has become extremely difficult to keep track of the devices people bring to work. This leads to the emergence of shadow IoT - the devices that the IT and security departments are completely unaware of. Because of these shadow devices, hackers can now exploit vulnerabilities much more easily than before. This article deals with the dangers and solutions to shadow IoT.
It’s important to look at the driving forces behind the smart city and how personal data dovetails with these to generate a fuller picture of what it means to live in a smart city.
12Page 1 of 2