security-network-security zero trust

Securing IoT Devices With Zero Trust Requires Mindset Shift

As data grows more integral to the enterprise, policies to protect it have to get more rigorous, especially those for IoT devices, which need a trust-but-verify approach. Zero-trust strategies are particularly important in a world of proliferating Internet of Things (IoT) devices. Many of these devices can access the network but also be easily compromised […]

edge-computing security-network-security

Five Principles in a Zero-Trust Security Approach to IoT

Zero-trust policies help prevent successful data breaches by eliminating unauthorized access to networks. A zero-trust security policy thus requires that devices and users wanting access to the network must always verify their identity. This principle of “Never trust; always verify” enables security administrators to constantly verify the nature of an IoT device before it accesses […]

security-hardware-based-security security-network-security security-services

An Integrated Approach to IoT Security

Ranging from autonomous vehicles to connected wind turbines, the Internet of Things is far from a monolithic technological concept. A single device can involve a patchwork of software and hardware. Securing Internet of Things (IoT) devices thus requires a comprehensive approach.  This e-book takes an integrated approach to IoT security. Key takeaways from this document, […]

edge-computing security-hardware-based-security security-network-security

Securing IoT at the Edge is Key to Safe IoT Operations

Key takeaways from this article are the following: Securing IoT devices at the edge is critical to a comprehensive IoT security strategy; devices can create a back door of access to corporate networks Lack of IoT protocol standardization and a dearth of IoT device encryption has made devices additional vulnerable. Machine learning-enabled tools can help […]

remote-monitoring security-network-security

Energy Grid Security Gets More Challenging With IoT

Key takeaways from this article include the following: Power grids have turned into security minefields as utilities’ connected footprint expands.  Utilities are susceptible to both cyber and physical threats. To reduce risk, utilities should establish an accurate asset inventory and use internal training and education to offset lack of security expertise among staff.  Today, IoT […]

asset-tracking building-automation remote-monitoring security-network-security

IoT Automation Trend Rides Next Wave of Machine Learning, Big Data

An array of new methods — along with unexpected new pressures — cast today’s IoT automation efforts in an utterly new light.  Progress today in IoT automation is based on fresh methods employing big data, machine learning, asset intelligence and edge computing architecture. It is also enabled by emerging approaches to service orchestration and workflow, […]

security-network-security

Cybersecurity Crisis Management During the Coronavirus Pandemic

The coronavirus pandemic is arguably the first time a biological virus has a significant impact on the security industry. Cybercriminals can exploit the vulnerabilities in the security protections of medical facilities, homes and factories. At the same time, a handful of governments have rethought physical security with surveillance infrastructure to enforce coronavirus quarantines.    The pandemic […]

home-building-smart-homes security-network-security smart-lighting

Smart Building Energy Management Systems Yield Cost Savings

One of the biggest challenges for commercial building owners and managers is how to reduce energy consumption and save money. Indeed, almost 40% of energy consumed in the U.S. powers commercial and residential buildings, according to the U.S. Energy Information Administration. But enabling smart technologies and real-time energy management systems can reduce costs by an […]