As data grows more integral to the enterprise, policies to protect it have to get more rigorous, especially those for IoT devices, which need a trust-but-verify approach. Zero-trust strategies are particularly important in a world of proliferating Internet of Things (IoT) devices. Many of these devices can access the network but also be easily compromised […]
This year has demonstrated the importance of IoT in health care, as remote and digital technologies become critical to triaging patient care and ongoing patient monitoring as well. COVID-19 brought new models of digitized care to the fore. It’s also brought increasing security complexity to the fore in health care IoT. The IoT in healthcare […]
Zero-trust policies help prevent successful data breaches by eliminating unauthorized access to networks. A zero-trust security policy thus requires that devices and users wanting access to the network must always verify their identity. This principle of “Never trust; always verify” enables security administrators to constantly verify the nature of an IoT device before it accesses […]
Ranging from autonomous vehicles to connected wind turbines, the Internet of Things is far from a monolithic technological concept. A single device can involve a patchwork of software and hardware. Securing Internet of Things (IoT) devices thus requires a comprehensive approach. This e-book takes an integrated approach to IoT security. Key takeaways from this document, […]
Key takeaways from this article are the following: Securing IoT devices at the edge is critical to a comprehensive IoT security strategy; devices can create a back door of access to corporate networks Lack of IoT protocol standardization and a dearth of IoT device encryption has made devices additional vulnerable. Machine learning-enabled tools can help […]
Key takeaways from this article include the following: Power grids have turned into security minefields as utilities’ connected footprint expands. Utilities are susceptible to both cyber and physical threats. To reduce risk, utilities should establish an accurate asset inventory and use internal training and education to offset lack of security expertise among staff. Today, IoT […]
An array of new methods — along with unexpected new pressures — cast today’s IoT automation efforts in an utterly new light. Progress today in IoT automation is based on fresh methods employing big data, machine learning, asset intelligence and edge computing architecture. It is also enabled by emerging approaches to service orchestration and workflow, […]
The coronavirus pandemic is arguably the first time a biological virus has a significant impact on the security industry. Cybercriminals can exploit the vulnerabilities in the security protections of medical facilities, homes and factories. At the same time, a handful of governments have rethought physical security with surveillance infrastructure to enforce coronavirus quarantines. The pandemic […]
One of the biggest challenges for commercial building owners and managers is how to reduce energy consumption and save money. Indeed, almost 40% of energy consumed in the U.S. powers commercial and residential buildings, according to the U.S. Energy Information Administration. But enabling smart technologies and real-time energy management systems can reduce costs by an […]