Articles about Internet of Things

Why, finally, all eyes are on OT [Q&A]

Operations center

Operational technology and IT have historically tended to follow separate paths. But in recent times the spread of Internet of Things devices has seen the two moving closer together.

We spoke to David Montoya, Paessler global business development manager OT/IoT, to discuss how the OT landscape has evolved and why businesses need to be on top of the change.

Continue reading

Businesses at risk from boom in IoT devices

Internet of things screen

New research from Forescout Vedere Labs reveals that 65 percent of devices across organizations are no longer traditional IT. Of these 11 percent are network equipment, while 24 percent are part of the extended IoT, such as IoT, OT and IoMT.

Financial services (54 percent), healthcare (45 percent) and oil, gas and mining (40 percent) are the sectors that have the highest percentages of non-IT devices.

Continue reading

Connected home devices face a surge in cyberattacks

Connected home smart home

The average household now contains 22 connected home devices and is subjected to nearly 29 attacks each day, almost triple the rate recorded last year.

This the key finding of a new joint report from Bitdefender and NETGEAR which highlights how the expanding Internet of Things ecosystem, spanning everything from smart TVs and streaming boxes to routers and cameras, has dramatically increased consumer exposure to automated cyberattacks and large-scale exploitation.

Continue reading

Hardware vulnerabilities soar amid spread of IoT devices

Internet of things screen

There’s been an 88 percent increase in hardware vulnerabilities amid a proliferation of IoT devices, and 81 percent of security researchers have encountered new hardware vulnerabilities in the past 12 months.

New attack vectors and often forgotten targets like APIs and hardware are vulnerable and should be a key focus for CISOs today according to a new report from crowdsourced security company Bugcrowd, which shows organizations face growing challenges as applications go through multiple development cycles under pressure to release features quickly, often aided by AI-assisted coding.

Continue reading

Why the cybersecurity industry needs to be more accessible [Q&A]

Cloud vulnerability lock

The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.

Organizations today are forced to juggle multiple tools, each with unique UI, costs, and maintenance headaches. They’re also often not able to buy the tools they need, because they are either too expensive or don't exist in the specific capacity they need.

Continue reading

Outdated printer firmware can leave organizations open to attack

Woman using multi-function printer

In the past the printer has tended to be a pretty dumb device, but as they’ve gained more features and extra connectivity printers have become a target for attacks and potentially a way of gaining access to networks.

A new report from HP Wolf Security, based on global study of 800+ IT and security decision-makers (ITSDMs), highlighs the challenges of securing printer hardware and firmware.

Continue reading

The devices that are exposing enterprises to risk

network router switch

The enterprise device landscape is becoming much more complex and more dangerous, with the average device risk per industry increasing by 15 percent year-on-year.

A new report from Forescout highlights that network-connected devices, from traditional IT operating systems to specialized healthcare systems and OT machinery, are exposing organizations to damaging threats such as ransomware attacks and data exfiltration.

Continue reading

Medical devices vulnerable to exploits and insecure connections

Medical tech scanner

A new report from Claroty finds that 89 percent of healthcare organizations have medical devices vulnerable to ransomware-linked exploits and insecure internet connectivity.

Based on analysis of more than 2.25 million Internet of Medical Things (IoMT) devices and 647,000-plus OT devices across 351 healthcare organizations, the report finds 99 percent have at least one known exploited vulnerability (KEV) in their networks, while 78 percent of hospitals have OT devices with KEVs, including building management systems, power supplies, and temperature controls.

Continue reading

Trump is back -- here’s what it means for IoT

Donald Trump

On January 20, Donald Trump was inaugurated to the highest office in the United States of America. If his last four-year term contains hints about his next four-year term, the tech sector can expect more protectionist policies reflected in tariffs, trade wars, and production.

For connected devices in the Internet of Things, this means flow-on effects in manufacturing supply chains and potentially stricter cybersecurity oversight. Let’s explore.

Continue reading

Managing the shift to machine-to-machine communication [Q&A]

Robots machine communication

As AI continues to evolve, it will enable machines to communicate in new, dynamic, autonomous ways without human intervention.

This machine-to-machine growth has a huge potential to impact industries from smart factories to energy. We spoke to John Kim, CEO of API communication specialist Sendbird, to discuss these changes and how they will affect business.

Continue reading

The future of facilities management software [Q&A]

Smart buildings smart city

The facilities management sector is in the midst of a digital evolution, driven by trends such as sustainability and smart buildings, and there are also increased regulatory demands in the mix.

We spoke to Phil Meyers, CEO of mpro5, to discuss what this means for facilities management software providers.

Continue reading

Attackers target edge devices in mass exploitation attacks

Edge computing

New research from WithSecure looks at the trend of mass exploitation of edge services and infrastructure by attackers.

The number of edge service and infrastructure Common Vulnerabilities and Exposures (CVEs) added to the Known Exploited Vulnerability Catalogue (KEV) per month in 2024 is 22 percent higher than in 2023, while the number of other CVEs added to the KEV per month has dropped 56 percent compared to 2023.

Continue reading

UK rolls out new consumer safeguards for smart devices

Smart home devices. Modern wireless technology communication domestic appliances

From today all new internet connected smart devices sold in the UK will be required by law to meet minimum-security standards.

The UK becomes the first country in the world to legally require manufacturers to protect consumers from hackers and cyber criminals accessing devices with internet or network connectivity.

Continue reading

IT leaders struggle to keep up with emerging threats

multiple threats

A new report shows that 95 percent of IT leaders say that cyberattacks are more sophisticated than ever and they are unprepared for this new wave of threat vectors.

The survey, of more than 800 IT and security leaders around the world, from Keeper Security reveals that firms are witnessing AI-powered attacks (51 percent), deepfake technology and supply chain attacks (both 36 percent), cloud jacking (35 percent), Internet of Things (IoT) attacks and 5G network exploits (both 34 percent), and fileless attacks (24 percent).

Continue reading

Preparing for a post-quantum security landscape [Q&A]

quantum computing

As widely available quantum computing draws closer, organizations need to consider the extent to which their supply chain presents risks and start building in post quantum readiness to their risk assessments.

To do this, it's critical for businesses to understand the origin and authenticity of all the components that are in the supply chain (both hardware and software). This is especially true for IoT devices, which rely on systems and subsystems created by multiple partners and vendors bringing their solutions together to make a fully functioning connected product/system.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.