1. Articles in category: Security

    1-24 of 651 1 2 3 4 ... 26 27 28 »
    1. Using the Collaborative Security Approach to Address Internet of Things Security Challenges

      Using the Collaborative Security Approach to Address Internet of Things Security Challenges

      Two years ago, our “Collaborative Security Approach” proposed a way of tackling Internet security issues based on the fundamental properties of the Internet and the voluntary cooperation and collaboration that's been prominent throughout the Internet's history. In this post, let us look at each of the five ...

      Read Full Article
    2. How to secure the network's intelligent edge in the Internet of Things

      How to secure the network's intelligent edge in the Internet of Things

      Much of the IoT's value resides at the network's edge, where organizations collect some of their most sensitive information. Traditional security measures can't always protect this data. Experts weigh in on how to prevent physical access to the network through IoT devices and safeguard the data collected and processed at the edge.

      Read Full Article
    3. Securing your organisation in an IOT world

      Experts predict that by 2020 there will be 4.3 Internet-connected devices for every man, woman, and child on the planet.

      Each of these connected devices generates data that is pushed, pulled, collected, sorted, analysed, stored, and examined. This data, and the information being extracted from it, has become the foundation for what is being called the new "Digital Economy". Revenue resulting from IOT is estimated to exceed $300 billion in 2020, with a global economic impact of $1.9 trillion.

      Read Full Article
    4. 5 ways to adapt your mobile security strategy for IoT

      5 ways to adapt your mobile security strategy for IoT

      Ready or not, the IoT wave is already breaking on enterprise shores. While smart, connected devices mean increased automation and digitisation, they also translate into new challenges that will require companies to shift their approach to security. Already, malware infecting common consumer IoT devices has led to a botnet of nearly half a million endpoints, with millions of devices still vulnerable to attack.

      Read Full Article
    5. Cryptzone transforms network security with new AppGate release

      Cryptzone, the Software-Defined Perimeter company, announced the newest version of AppGate, which enables organisations to easily deploy a software-defined perimeter (SDP) for granular access control. The release of AppGate 3.0 furthers Cryptzone's vision for transformational network security – where all network services adopt an identity-centric security model.

      Read Full Article
    6. A truly strategic approach to security has never been more business critical

      A truly strategic approach to security has never been more business critical

      Whatever industry they operate in, in 2017 organisations are coming under transformational pressure from a multitude of different angles; from disruptive competitors driving the need for agile service delivery, through to regulatory pressure such as the EU’s General Data Protection Regulation (GDPR) or the Payment Service Directive 2 (PSD2).

      Read Full Article
    7. Will the enterprise welcome the Internet of Things? | ITProPortal

      Will the enterprise welcome the Internet of Things? | ITProPortal

      Just three years ago, the concept of IoT (Internet of Things) was still fresh; people bought devices because they were ‘cool’ or because it seemed that we could improve quality of life with ownership. This area of the market has seen huge growth since then – and IoT has changed - almost any device is available in this new form, from the norm of personal assistants and security cameras to the more diverse, in the form of coffee makers and even umbrellas.

      Read Full Article
    8. Will the enterprise welcome the Internet of Things?

      Will the enterprise welcome the Internet of Things?

      Just three years ago, the concept of IoT (Internet of Things) was still fresh; people bought devices because they were ‘cool’ or because it seemed that we could improve quality of life with ownership. This area of the market has seen huge growth since then – and IoT has changed - almost any device is available in this new form, from the norm of personal assistants and security cameras to the more diverse, in the form of coffee makers and even umbrellas.

      Read Full Article
    9. Big Data & Data Analytics Market in Homeland Security and Public Safety: 2017-2022

      Big Data & Data Analytics Market in Homeland Security and Public Safety: 2017-2022

      Help support the best source of IoT news on the web This site was created by James Chevalier in 2010, and has remained self-funded since then. You can help support the site by signing up for a low-cost monthly subscription. In return for your contribution: The price of the subscription is $2 per month (USD). All billing is handled directly by Stripe, so your credit card information is safe with them.

      Read Full Article
    10. Taking IoT security to the next level through GSMA-Verizon partnership

      Taking IoT security to the next level through GSMA-Verizon partnership

      Taking IoT security to the next level through GSMA-Verizon partnership Media contact(s) @AdriaTomasz With a billion-plus smart devices connected worldwide, the Internet of Things (IoT) is well on its way to reinventing the way we live, work and play. And with more connections coming online each day, securing applications and devices has never been more important.

      Read Full Article
    11. Security Solutions to Expand Smart IoT Markets 2017-2022 - Research and Markets

      The report Security solutions to expand smart IoT markets analyzes the Internet of Things (IoT) security business opportunity. Service providers rely on IoT solutions to reach new efficiencies and performance optimization along with the introduction of new big data analytics. Although the potential benefits are undeniable, today most IoT systems lack adapted security architectures to face the risks of a connected world.

      Read Full Article
    1-24 of 651 1 2 3 4 ... 26 27 28 »
  1. Register to our Newsletter

    Enter your e-mail address for receive the top headlines.

     

    This newsletter aggregates all the latest IoT news from around the world. Sign up for a daily or a weekly newsletter here.

  2. Latest Tweets

  3. Categories

    1. Curation Categories:

      All News, Big Data News, Cellular IoT, Data, Enterprise, Enterprise Solutions, Fragmentation, Healthcare, Insurance, IoT Security News, Monetizing IoT, Professional Services, Public Spaces, Retail, Security, Transport
  4. Monetizing IoT
  5. Popular Articles