New solution protects converged IT and OT environments

Industrial IoT

The line between information technology and operational technology is an increasingly blurred one. As companies drive towards digital transformation so OT environments increasingly interconnect with IT, resulting in a complex, sensitive and vastly expanded attack surface.

This means OT security responsibility is often moving to to the CISO. Yet traditional IT security solutions lack the ability to continuously discover and assess sensitive OT assets.

Continue reading

Google pivots Android Things to focus solely on smart speakers and displays

Android Things

Google has announced that it is dramatically narrowing the focus of Android Things, originally conceived as the company's wide-ranging IoT platform.

Now rather than being an OEM tool that can be used to produce just about anything for the Internet of Things, Android Things will instead be focused on just two product lines: smart speakers and smart displays.

Continue reading

New tool makes it easier to secure IoT devices

Wireless internet of things

Internet of Things devices are appearing in more and more companies, but with them comes the threat of cyberattacks.

To reduce this risk Extreme Networks is launching a simple security solution to help organizations protect unsecured IoT devices.

Continue reading

Unpacking the influence of the IoT in travel

Suitcase vacation

You cannot miss the signs of technological advancement in travel today. From mobile ticketing to biometric scanning at amusement parks, today’s business trips and family vacations look vastly different than in years past. Innovation has come just in time for the crowds -- Expedia Group reported a 40 percent increase in the number of people traveling for business and leisure since 2016, and this number is on track to grow in the coming years.

Behind the scenes, one of the quiet workhorses of hospitality innovation has been the Internet of Things (IoT). Broad and flexible IoT coverage has already enabled major changes in the traveler experience and the hospitality industry, through innovations such as luggage tracking to parking and trash management. Largely in part to communication networks that enable the travel industry to implement a variety of innovative solutions, cheaply.

Continue reading

4 critical steps to building an IoT network

Internet of things

The biggest mistake often made in building an IoT network for the first time is in underestimating the complexity of IoT network design, operation and management -- and believing that legacy network technologies and engagement models will support the requirements of large-scale IoT deployments.

Building an IoT network is not as easy as it sounds and the process of building your own tends to break down when confronted with massive scale. What may seem to be an easy task of deploying gateways and managing device provisioning and connectivity quickly becomes challenging with respect to scaled site and network operations. Some may also find challenges with sourcing and qualifying end devices for their applications, device configuration and management, implementing encryption and security services, and ultimately generating contextualized data for their use cases. Taking the following four steps to develop your IoT network buildout is essential.

Continue reading

Video sensors, medical devices and security worries -- IoT predictions for 2019

Internet of things

More and more devices in our homes and workplaces are gaining smart capabilities as the Internet of Things starts to move from niche to mainstream.

But greater adoption also means an expanded threat surface. So what can we expect to see from the IoT in 2019? We’ve rounded up the opinions of some industry experts.

Continue reading

8 key factors for an effective Internet of Things (IoT) network

Internet of things

Connected devices, or the Internet of Things (IoT), are exploding on the market. Securing their access has become one of the major concerns in recent years. But security is only part of the equation. What good is a secure network if you cannot access it?

 As more and more devices connect together, the availability to connect becomes paramount. If your business is going to depend on an IoT infrastructure, it must be available, accessible, and safe from attack. If you cannot count on your infrastructure, you cannot depend on it. When selecting an IoT platform, these are the sort of issues that should be considered.

Continue reading

IoT malware up over 200 percent in 2018

Network security

New malware targeting IoT devices grew 72 percent, with total malware growing 203 percent in the last four quarters according to McAfee's third quarter threat report.

This growth has been partly due to devices being harnessed for cryptomining. IoT devices such as cameras or video recorders have not typically been used for this because they lack the CPU power of desktop and laptop computers.

Continue reading

The beginning of the end for the password, more regulation and more IoT risks -- cybersecurity predictions for 2019

2019 calendar

When we looked at security predictions at this time last year some experts were predicting that we'd see attacks on cryptocurrencies and that we'd continue to see a rise in the scale and profile of attacks.

They've been proved right on both counts over the course of 2018, so what is next year going to have in store? We've canvassed the views of a number of industry figures to find out what they see as the key security issues for 2019.

Continue reading

Symantec launches neural network device to protect critical infrastructure

Symantec ICSP Neural

Operational technology is critical in areas like energy, oil and gas, manufacturing, and transportation, but it's often be based on legacy systems which can be difficult to keep secure, with updates often needing to be carried out using USB devices.

The threat of attacks is very real though and the consequences especially disastrous, yet many control systems are running outdated software, leaving them vulnerable to attack.

Continue reading

Early adopters delay IoT purchases over security concerns

Internet of things

While people are still excited about Internet of Things technology, many are delaying buying over concerns about privacy and security.

A new survey from cyber security company F-Secure shows that 63 percent of early adopters are looking to purchase new devices, but 50 percent have delayed an IoT purchase because of security concerns.

Continue reading

UK government launches guidance to help secure IoT devices

Internet of things

There are expected to be more than 420 million internet connected devices in use across the UK within the next three years and if poorly secured these can leave people exposed to security issues and even large scale cyberattacks.

To address this, a new voluntary Code of Practice is being launched by the UK government to help manufacturers boost the security of internet-connected devices such as smartwatches, virtual assistants and toys.

Continue reading

New partnership aims to bring deeper insights from machine data

Data analytics

The rise of the Internet of Things has presented businesses with huge volumes of data, but harnessing that to produce useful insights can be a challenge.

A new partnership between Trifacta, a leader in data preparation, and Sumo Logic, a cloud-native machine data analytics platform, is aimed at driving improved business intelligence.

Continue reading

Data transformation: The missing ingredient from edge computing strategies

Edge computing

It’s easy to get excited about the Things in the Internet of Things (IoT). Tiny computers, factory robots, devices with 3D cameras, devices with GPS units -- everything from telemetry units on long-haul freight trucks to gumball-size sensors reporting from atop the cooling towers of power plants. The world of network-connected devices, whether specialized or general purpose, is more varied and creative than ever.

The innovation taking place with this hardware is truly impressive. But to take full advantage of the hardware, it’s important to pay just as much attention to the software. Edge computing is going to quintuple the amount of data enterprises collect from devices in just the next three years. quintuple the amount of data that enterprises collect from devices in the next three years alone. How to manage that data and make the most of it -- well, that’s a pretty edgy job.

Continue reading

Bulletproof IT strategies needed as cloud, IoT adoption climb

IoT

Enterprises now acknowledge that technology drives business today. Because of this, IT departments now face plenty of challenges as business processes transition to digital. New technologies such as cloud computing and the Internet of Things (IoT) are also finding more use in enterprise computing as they already have shown to be game-changing advantages for those who adopt them.

Companies are shifting more of their workloads and infrastructure to the cloud to maximize the flexibility that cloud computing provides. However, this also means that IT departments now face new challenges of managing complex hybrid infrastructures.

Continue reading

Load More Articles