Articles about Internet of Things

OT and ICS vulnerabilities increase in the second half of 2021

Industrial internet of things

Operational technology and industrial control systems saw a 110 percent increase in the number of vulnerabilities disclosed in the second half of last year.

The latest Biannual ICS Risk & Vulnerability Report from Claroty shows that remotely exploitable vulnerabilities are still causing problems, demonstrating the importance of securing remote connections.

Continue reading

The challenge of managing and securing IoT devices in the enterprise [Q&A]

Wireless internet of things

Internet of Things devices are making their way into more and more areas of our lives. But while they offer many benefits they also present businesses with a problem when it comes to managing and securing them.

An ever widening range of devices now have connectivity that may be off the radar of company IT and cybersecurity teams. We spoke to Roy Dagan, CEO of SecuriThings, to discuss the issue and how enterprises can tackle it.

Continue reading

Working from home leads to increased 'digital anxiety'

panic

The COVID-19 pandemic has provided a boost to the numbers of people working remotely. But a new study from F-Secure finds that 67 percent of internet users who work from home reported they increasingly worry about their online security and privacy, even if nothing is wrong, compared to 58 percent of other users.

Remote workers also report raised concerns about a range of other of issues, for example 65 percent of those who work from home say the internet is becoming a more dangerous place, compared to only 54 percent of other respondents.

Continue reading

6 IoT trends for 2022

IoT links

The Internet of Things (IoT) has seen incredible growth in a relatively short period. Despite being fairly new, smart devices are everywhere in commercial and consumer circles, and they show no signs of stopping.

While the IoT’s growth may remain unchanged in 2022, it will shift and evolve. Here are six trends that will shape the IoT this year.

Continue reading

How control system vulnerabilities can threaten the oil industry [Q&A]

refinery industry

The Colonial Pipeline attack in 2021 highlighted how vulnerable industrial control systems, and in particular energy supplies, can be to cyberattacks.

The oil and gas sector is particularly at risk as it often relies on older devices that don't receive timely firmware updates. We spoke to Mark Kerzner, CEO and co-founder of ElephantScale and Scaia AI who has worked with many oil industry leaders, to find out more about the risks and how they can be addressed.

Continue reading

Market opportunities, security challenges and the edge -- 5G predictions for 2022

5G circuit board

Although 5G technology isn't yet available to everyone, the rollout continues and as it does businesses need to recognize the challenges and opportunities that it brings.

Here are some industry expert views on what we can expect from 5G in 2022.

Continue reading

The challenges of protecting industrial control systems [Q&A]

refinery industry

Industrial control systems are often critical to things like power and water supplies. In theory they should have the strongest protection available.

In practice, however, this isn't always the case. It's estimated that 91 percent of industrial companies are vulnerable to cyberattacks. So what can businesses do to protect themselves and to recover quickly if they do get attacked?

Continue reading

How smart technology is changing the supply chain [Q&A]

supply chain

Suppliers, distributors and customers alike are faced with rising supply chain costs, partly as a result of disruption caused by the COVID-19 pandemic.

The idea of smart contracts, using blockchain and the IoT to automate contract execution, has been around for a while. But is now the time for them to start coming into their own, and how can they benefit enterprises?

Continue reading

The machine identity crisis -- and what to do about it [Q&A]

digital identity clone

Every single networked machine relies on an identity -- in the form of cryptographic keys or digital certificates -- so that it can identify itself and communicate with other machines securely.

In the wrong hands though machine identities can enable cybercriminals to appear trustworthy, slip past security defences undetected, gain access to networks, and exfiltrate data. Yet organizations still overlook the importance of protecting them.

Continue reading

How software descriptions can open the door to cyberattacks [Q&A]

Software testing

The use of SaaS-based applications and systems has taken off in recent years, but that surge has highlighted a problem in the form of a lack of standardization for software descriptions across all types of systems.

This makes it much harder for IT teams to assess vulnerability levels across all the packages in an enterprise. But what risks does this pose and how can businesses tackle the problem? We spoke with Peter Lund, VP at operational technology cybersecurity company Industrial Defender, to discover more.

Continue reading

Healthcare organizations face increased risk

Healthcare data

Healthcare organizations and patients are facing greater risk as an increase in connected devices creates an expanded attack surface according to a new report.

The study from asset management and security platform Armis surveyed 2,000 patients and 400 healthcare IT professionals across the US and shows a disconnect between the concerns of the two groups.

Continue reading

The challenges for developers in the medical device sector [Q&A]

Healthcare data

Across all industries developers are under pressure to deal with rapidly shifting requirements and faster turn around times.

But in highly regulated sectors like healthcare there are extra demands to ensure safety and compliance. We spoke to Roger Mazzella, senior product manager, medical at productivity platform The Qt Company to find out how developers can address these challenges while still meeting delivery times.

Continue reading

Maintaining visibility through the growth of IoT

IOT_Internet_of_Things_2017

Data traffic rates over network backbones have increased significantly over the past several years. Fueled by the increasing demand of Internet of things (IoT) devices which continue to be more readily integrated with our daily lives, both domestically and commercially, the average annual volume of data/ information created has almost doubled over the past two years, from 41 zettabytes in 2019 to 79 zettabytes in 2021, with a forecast of growth to 181 zettabytes by 2025 (Statista, 2021).

Over the previous 18 months, this data rate has been driven further by the move to working from home (WFH) where people are using more digital technology, as well as purchasing new IoT devices to help make their WFH life more comfortable.

Continue reading

Why quantum computing is a security threat and how to defend against it [Q&A]

quantum computing

Quantum computing offers incredible computing power and is set to transform many areas such as research. However, it also represents a threat to current security systems as cracking passwords and encryption keys becomes much easier.

So quantum is a security threat, but is there a solution to making systems safer? We spoke to David Williams, CEO of symmetric encryption specialist Arqit, to find out.

Continue reading

60 percent of Americans have smart TVs but many remain unprotected

Smart tv and  hand pressing remote control

Almost 60 percent of Americans have smart TVs in their homes, yet almost one in four do nothing to protect their smart devices.

This is according to a new study by NordVPN which highlights a number of risks, including hackers being able to access a smart TV's camera and microphone through malware.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.