Why building management system cybersecurity is critical [Q&A]


Building management systems (BMS) are responsible for controlling and monitoring various building services such as HVAC, energy, elevators, escalators, surveillance and access control.
They're crucial for service delivery across industries, including critical infrastructure such as energy, utilities, and healthcare. But they're also a significant of an organization's cyber risk due to their integration with IT networks and the internet.
Building an effective and insurable IoT security policy [Q&A]


As businesses look to manage their cybersecurity risk, many have turned to insurance to cover the financial implications of a successful breach.
However, insurers naturally want to limit their own exposure to risk and the small print of the policy may limit some claims. In particular this can apply to IoT devices which represent a major unprotected attack surface in corporate networks.
Organizations face increased challenges securing IoT devices


We reported earlier today that businesses are struggling with IoT device connectivity, another report out today shows that securing these devices is a major problem too.
The study for Keyfactor, conducted by Vanson Bourne, finds 97 percent are struggling to secure their IoT and connected products to some degree.
Businesses struggle with IoT device connectivity


A new report finds that IoT success is being jeopardized with just one percent of respondents achieving better than 98 percent connectivity levels on average across their devices.
The study, by connectivity solutions specialist Eseye, shows that only 16 percent of respondents are achieving more than 95 percent connectivity. Mission-critical IoT devices -- medical equipment for example -- require near-100 percent connectivity and the fact that companies are prepared to accept poor performance is concerning.
The IT assets that could put your organization at risk


Attackers are always looking for routes that will offer them a way into organizations' networks. New research released today by Armis shows the devices that are most likely to pose a threat.
Interestingly the list includes various personal devices as well as business assets, suggesting attackers care more about their potential access to assets rather than the type and reinforcing the need for security teams to account for all physical and virtual assets as part of their security strategy.
60 percent of healthcare industry cyber incidents impact patient care


A new survey from Claroty of 1,100 cybersecurity, engineering, IT, and networking professionals from healthcare organizations finds 78 percent of respondents experienced a minimum of one cybersecurity incident over the last year.
Perhaps more concerning is that 60 percent of those incidents had a moderate or substantial impact on patient care and 15 percent had a serious impact that compromised patient health and/or safety.
Empowering the partner ecosystem: How businesses can gain resilience connectivity


In today's networked economy, the ability to create value depends primarily on the relationships built with other firms. As a result, strategic and product-related decision-making becomes increasingly complex. This is because a business is viewed as a component of a broader economic ecosystem and environment, where it influences and is influenced by other partners, suppliers, and organizations.
Within a business ecosystem, firms collaboratively and competitively develop innovations and capabilities where they have the capacity and freedom to do so. This enables them to support new products, meet customer needs, and incorporate subsequent waves of further innovation. Platform-based technology frequently supports these ecosystems, serving as foundations for products and services. Suppose businesses want the ability to facilitate transactions between distinct groups of users in a two or multi-sided market. To do this, they need connectivity infrastructure that is robust and reliable enough to support it alongside partners that can enable it.
IoT and digital replicas: Powering up innovation with digital twins


The concept of digital twinning isn’t a new one. More than 40 years ago, NASA used an early form of digital twin technology to bring the Apollo 13 astronauts safely back to Earth. By replicating the real-life conditions of the crippled spacecraft in its simulators, NASA was able to identify the right strategies and procedures for achieving a successful return in the damaged craft and deliver this critical information to Apollo’s flight crew.
Fast forward to today, and digital twin applications are now being deployed by organizations eager to harness the power of virtual prototyping to reinvent their operations. All made possible by the growing prevalence of IoT devices that pull real-time data collected from physical objects, which is used to create digital twins that deliver unprecedented visibility into assets and production processes.
How analytics can boost the supply chain [Q&A]


Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.
We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.
Multiple-threat ransomware attacks become more common


It used to be the case that all you had to worry about with ransomware was encrypted data, but the latest Cyberthreat Defense Report (CDR) from CyberEdge Group reveals that last year 78 percent of ransomware victims faced the consequences of one, two or three additional threats unless they paid the ransom.
Additional threats include launching distributed denial of service (DDoS) attacks (42 percent), notifying customers or the media of the data breach (42 percent), and publicly releasing exfiltrated data (40 percent).
How businesses can overcome IoT device firmware skills shortages


In recent years, the Internet of Things (IoT) has become an increasingly important area for businesses as more and more companies look to connect their products and services to the internet to deliver new experiences and unlock new revenue streams and capabilities. In Eseye's Annual State of IoT Adoption survey, over three-quarters (76 percent) of respondents said that IoT is a priority for their business in the next two to three years.
However, the design of hardware, firmware, and coding connectivity management software into IoT devices are all highly specialist areas. These three core components require significant specialized knowledge and expertise. A considerable skills gap in the industry makes it difficult for businesses to successfully design, develop, and deploy IoT estates.
Connected device vendors devote more effort to security and safety


More and more connected systems are being used to deliver the essentials of our everyday lives. From the water and power that comes into our homes to the medical treatment we receive, the 'Extended Internet of Things' (XIoT) is involved.
A new report on the state of XIoT security from Claroty's Team82 researchers shows vulnerabilities in these cyber-physical systems disclosed in the second half of 2022 declined by 14 percent since hitting a peak in 2021. At the same time vulnerabilities found by internal research and product security teams have increased by 80 percent over the same period, indicating that vendors are taking the risk seriously.
Why organizations must not overlook connectivity design before rushing IoT devices to market


Spurred on by the dramatic shift in the global economy, the acceleration of digital transformation triggered a rise in new technologies appearing on the market. As a result, businesses have responded fiercely, scaling IoT initiatives rapidly, with mixed results.
With growing interruptions in workflow due to poor connectivity, integration, and supply chain issues, organizations have had to cope with a long list of challenges when deploying IoT to market. This has included the drive to cut costs, adhere to ever-tighter deadlines, and plug the ongoing engineering skills shortage gap.
Economic pressure forces connected device makers to seek efficiencies


Economic pressures are forcing delays and price increases on connected device makers, with 38 percent experiencing delays in bringing devices to market, while almost half (48 percent) say they have been forced to increase prices.
New research from the Qt Group -- based on a survey of 250 embedded device manufacturers in the US, UK, France and Germany, conducted by Censuswide -- finds manufacturers are adopting various techniques in order to fuel efficiencies.
Cheaper sensors, privacy challenges and stronger standards -- Internet of Things predictions for 2023


As more everyday devices gain connectivity features the Internet of Things is increasingly a part of everyone's lives.
Like any new technology it brings challenges around privacy and security, as well as placing additional demands on networks and data handling. Here is what some experts think we'll see from the IoT in 2023.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.