Trump is back -- here’s what it means for IoT


On January 20, Donald Trump was inaugurated to the highest office in the United States of America. If his last four-year term contains hints about his next four-year term, the tech sector can expect more protectionist policies reflected in tariffs, trade wars, and production.
For connected devices in the Internet of Things, this means flow-on effects in manufacturing supply chains and potentially stricter cybersecurity oversight. Let’s explore.
The coming of 6G poses new IoT security vulnerabilities


A growing challenge for 6G wireless development involves the potential for unexpected cybersecurity vulnerabilities. This is especially true given the growing set of Internet of Things (IoT) use cases with complexities such as connected cars, smart cities, and even satellite-based (non-terrestrial networks (NTN) IoT. The expanding security threat surface is particularly concerning due to its novelty and the lack of thorough testing by researchers.
IoT vulnerabilities themselves are nothing new. We have seen the hacking of home doorbell cameras since the advent of 4G. However, that problem has less to do with wireless standards than with homeowners making poor decisions about how to manage device passwords.
A technical overview of Cisco IoT part 5: Exploring Cisco's competition in the expanding IoT landscape


The fifth and final article in the Cisco IoT series explores how Cisco’s competitors are navigating the rapidly expanding Internet of Things (IoT) landscape. Building on the previous installment, which covered Cisco Meraki, training resources, and certification pathways, this article shifts focus to examine how other key players in the networking industry are positioning themselves to capitalize on the IoT revolution.
IoT is transforming industries, with use cases expanding across healthcare, retail, manufacturing and beyond. It’s reshaping how organizations operate, offering enhanced security, cost savings and new capabilities through advanced sensor technologies. As this sector evolves, Cisco and its competitors are racing to offer innovative solutions. But how do Cisco’s competitors stack up when it comes to IoT? This article takes a closer look at Juniper, Aruba, Arista and other vendors to assess differing IoT strategies and where each stands in comparison.
RTOS vs Linux: The IoT battle extends from software to hardware


There’s certainly something happening regarding operating systems in the Internet of Things (IoT). Chips are getting smarter, devices are getting smaller, and speeds are getting faster. As a result, device developers are more often experimenting with their operating system of choice, moving away from Linux and toward real-time operating systems (RTOS).
This is an evolution on two fronts. On the software side, applications requiring low latency and deterministic responses are turning to Zephyr, FreeRTOS, and ThreadX. And now, on the hardware side, we’re seeing more chip manufacturers entering the fray with RTOS-specific hardware that rivals or surpasses performance of entry-level Linux boards. This is a big deal since these chips optimize hardware-software integration, creating a more thorough ecosystem for purpose-built solutions with RTOS.
A technical overview of Cisco IoT part 4: Advancing IoT knowledge -- Cisco Meraki, training resources and certification pathways


This is the fourth piece in the ongoing Cisco IoT technical overview series, following a detailed analysis of security essentials and industrial applications. This installment of the series explores Cisco Meraki, essential IoT skill sets and additional resources to enhance knowledge and expertise in this rapidly evolving field.
The Internet of Things (IoT) is an expanding area of networking with an ever-growing array of use cases. It is significantly impacting organizations across industries, particularly in healthcare and retail. IoT technology enhances operations by providing valuable security, cost-saving benefits, and new capabilities, such as improved inventory management and product innovation.
A technical overview of Cisco IoT part 3: Security essentials & industrial applications


Following the second installment of this Cisco IoT series regarding IoT networking and security supported by Cisco's innovative hardware offerings, this next discussion explores related key topics that are essential for understanding and implementing IoT solutions effectively.
This comprehensive overview will cover critical aspects such as IoT security, operational technology visibility, and industry-specific use cases. By examining these elements, readers will gain a clearer picture of how Cisco's advanced IoT solutions can enhance security, improve operational efficiency, and drive business innovation across various sectors.
Why you need data guardrails, not guidelines [Q&A]


Often described as the lifeblood of an organization, data drives business operations and decision-making. But while the raw data itself is valuable, it’s the intelligence and insights that can be gleaned from it that truly fuel innovation and growth. This vital intelligence is the foundation on which organizations build long-term strategies, optimise processes, and identify new opportunities.
However, with IoT and AI creating volumes of data at an unprecedented rate, it has come to a point where many large enterprises have data lakes and warehouses overflowing with untapped potential.
No, Linux isn't always best for IoT


Ask a connected device developer which operating system they prefer and most -- about three-quarters to be exact -- will reply with Linux. The open-source system is far and away the king of the Internet of Things (IoT) thanks to its flexibility and support for various architectures.
But there’s a problem. Simple, single-function devices like smart thermostats or connected bird feeders often don’t require the robust processing power of Linux. Loading these devices with multi-tasking capabilities can be inefficient and potentially risky. Recent reports of backdoor vulnerabilities in Linux, for example, raise concerns about its attack surface and open-source origins.
A technical overview of Cisco IoT part 2: Hardware


The following article continues the Cisco IoT series, shifting focus to the essential networking hardware that powers IoT solutions. Part one of the series explored the foundational elements of IoT routing and switching, emphasizing the critical role these components play in ensuring seamless connectivity and robust data flow. Building on that discussion, this piece will outline the significant opportunities in IoT networking and security that Cisco supports through its innovative hardware offerings.
IoT is a rapidly expanding area of networking with increasing use cases. It impacts various sectors, including healthcare and retail, by providing valuable security or cost-saving benefits through new forms of sensors. These sensors enable new capabilities such as better inventory management and improved products.
Cherry Embedded Solutions unveils RINGNECK SOM-PX30-µQ7 for diverse HMI applications


CHERRY Embedded Solutions has launched the RINGNECK SOM-PX30-µQ7, a new compact System-on-Module designed specifically for energy-efficient and space-sensitive Human-Machine Interface (HMI) applications. The module leverages Rockchip’s low-power SoC PX30 with a quad-core ARM Cortex-A35 CPU, ensuring optimized performance for mobile devices across various industries.
The RINGNECK SOM-PX30-µQ7 distinguishes itself with a rich suite of interfaces, including WiFi, Bluetooth, Ethernet, CAN bus, USB, and multiple MIPI options. These features make it a versatile choice for developers looking to create professional-grade applications without sacrificing cost-efficiency or functionality.
Redefining security in mobile networks with clientless SASE


As organizations adapt their IT ecosystems to incorporate IoT devices and expand remote working opportunities allowing employees to use personal mobile devices, enterprise mobility has become indispensable in modern business operations. Nonetheless, this shift presents numerous security challenges and lifecycle management considerations, especially given that mobile devices connecting to networks frequently lack compatibility with traditional security solutions such as Virtual Private Networks (VPNs) or endpoint tools.
Mobile Network Operators (MNOs) and Mobile Virtual Network Operators (MVNOs) are at the forefront of this challenge. These service providers are tasked with the dual responsibility of ensuring optimal connectivity while safeguarding data privacy and user experience. As the market for basic connectivity services becomes increasingly commoditized, these operators are compelled to explore new avenues for revenue through value-added services. Among these, security services stand out as a promising opportunity.
Navigating the Cyber Trust Mark: A roadmap for IoT device manufacturers


There are more than 15 billion IoT devices worldwide, and that number is expected to reach 29 million by 2030, with consumer products like baby monitors, smartwatches, and fridges accounting for more than half. However, connectivity comes at a cost. Data usage, privacy concerns, and cyberattacks pose a serious threat to users and manufacturers. To address this, the government has implemented a Cyber Trust Mark Program to help people easily identify products that meet security standards. The initiative provides manufacturers with a roadmap to improve security and prepare for future requirements.
A key part of The Cyber Trust Mark program is that devices must pass tests designed to ensure security and data privacy. Securing connected solutions poses a unique challenge for manufacturers. While patching a network configuration issue is simple, software is often separated from connected device design workflows. This means security testing occurs in the final stages of product design, making it harder to build security from the ground up.
A technical overview of Cisco IoT: Routing and switching


The topical area of Cisco’s IoT (Internet of Things) offerings includes assorted types of wireless networking, and they consist of widely disparate requirements in different use cases such as “industrial networking.”
At recent partner training courses and presentations, Cisco summarized its product applications to various market niches. The following article offers a compiled summary of Cisco's IoT products, describing how they might be used and pinpointing why tech decision-makers should care about specific features.
Fewer than half of IT leaders confident in their IoT security


A new survey from Viakoo shows that only 50 percent of IT leaders are confident in their Internet of Things security and that 55 percent of IoT cyber incidents could have been prevented with better security measures.
In addition 71 percent say they wish they had started their IoT security efforts differently in order to remediate issues faster.
A smarter society, rise of the robots and security worries -- Internet of Things predictions for 2024


With ever increasing numbers of smart devices in our homes and workplaces, the Internet of Things has become an established facet of everyday life.
But like the rest of the technology industry the IoT isn't standing still. Here are some expert views on the opportunities and risks it's likely to present in 2024.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.