Home Tags Security
Next installment in the smart city privacy series. Why is privacy so important and how does surveillance capitalism fit with the development of the smart city?
Read this post and find about security vulnerabilities found in Amazon Echo and Yandex Station as weall as about dodgy apps on Alexa and Google Home.
The tech market’s latest big thing is the Internet of Things, which provides a way to wirelessly connect devices to a network and transfer data without human-to-human or human-to-computer interaction.The role of identity management in IoT is expanding like never before. IAM is focused on identifying people and managing access to different data types (like sensitive data, non-sensitive data, or device data). IAM helps identify devices, too, while managing user access to data, thus safeguarding against breaches and malicious activities
6 tips from NETSCOUT's Chief Security Officer on how consumers can secure their IoT devices this holiday season.
Today's home IoT devices are a security nightmare. Here are three simple ways that home users should protect themselves and the other devices connected to their home networks.
The pathetic security of many IoT devices has been well known for years, but in 2020, governmental actions like SB-327 are finally coming into place. But are they too little, too late?
Blockchain and IoT are best viewed as business tools, not just some new technological innovations. When combined they have the potential to drive the construction industry towards effectiveness, accountability, and transparency. Whilst there are still several hurdles to overcome, their potential to reshape the construction industry for the better is simply too great to be missed.
Mo Connections, Mo Vulnerabilities. The more connected IoT devices a smart city employs, the greater the risk to individual privacy. This blog explores one example of a company working on smart city technology and the security challenges it exemplifies - Sidewalk Labs, owned by Google’s parent company, Alphabet Inc. and one of the leading organizations in the field.
No company can create an IoT solution alone, and vendors increasingly must form strategic partnerships that give them access to all necessary complementary technologies. An effective partnership will speed time to market for solutions that not only optimize the customer experience but also protect users and their personal data against growing cyber security threats while offering the scalability to support growth and changing requirements.
This article explores the IoT's role in classroom education and security. It focuses on how students and teachers can benefit from connected devices, as well as how schools can improve security with it.