1. Articles in category: Security

    601-624 of 651 « 1 2 ... 23 24 25 26 27 28 »
    1. Gartner predicts top 10 technologies for information security in 2016

      Gartner predicts top 10 technologies for information security in 2016

      Home / News / Gartner predicts top 10 technologies for information security in 2016 Gartner predicts top 10 technologies for information security in 2016 By Express Computer on June 16, 2016 @Ujale Top 10 technologies for Information Security in 2016 The global research firm Gartner has predicted top 10 technologies for Information Security in 2016.

      Read Full Article
    2. Businesses 'confused' about how to secure their IoT devices

      Businesses 'confused' about how to secure their IoT devices

      Facebook Even though businesses are aware of the growing number of Internet of Things (IoT) devices connecting to their network, they’re not really confident about how to properly secure them. Those are the results of a new survey by ForeScout Technologies , which polled more than 350 IT professionals about their companies’ security practices regarding IoT. More than eight out of 10 (85 per cent) said they aren’t sure if they can detect a device as soon as it connects to their network.

      Read Full Article
    3. IoT Devices Not Properly Secured on Enterprise Networks: Survey

      IoT Devices Not Properly Secured on Enterprise Networks: Survey

      Internet of Things (IoT) devices are becoming an increasingly important part of enterprise environments, yet companies continue to fail at securing them properly, a recent report sponsored by ForeScout reveals. According to the research, nearly three quarters of enterprises either don’t have efficient protection methods for their IoT devices, or are not aware of what is being used.

      Read Full Article
    4. New WSO2 White Paper Examines the Benefits, Risks and Challenges of Managing Identity Across the Internet of Things

      New WSO2 White Paper Examines the Benefits, Risks and Challenges of Managing Identity Across the Internet of Things

      With the rapid rise of the Internet of Things (IoT), the concept of identity management has extended to the Identity of Things (IDoT). Through IDoT, organizations can assign unique identifiers with associated metadata to devices, enabling them to connect and communicate effectively with other entities over the Internet.

      Read Full Article
    5. New security threats rise on mobile, IoT – HPE Business Insights

      Ransomware, the Internet of Things, and more top a 2015 Cyber Risk Report that finds old weaknesses also remain. Ransomware, mobile attacks, and the increased importance of the Internet of Things lead the list of rising security threats—even as long-known vulnerabilities and vectors continue to serve cybercriminals well. The newly released HP Cyber Risk Report 2015 finds that new threats are emerging even as old threats remain.

      Read Full Article
    6. Survey Identifies Internet of Things (IoT) Security Challenges for the Connected Enterprise

      Survey Identifies Internet of Things (IoT) Security Challenges for the Connected Enterprise

      CAMPBELL, CA--(Marketwired - Jun 14, 2016) - ForeScout® Technologies, Inc., the pioneer in agentless cybersecurity, today announced the findings of its new "Enterprise Internet of Things (IoT) Survey." Commissioned by ForeScout and conducted by a non-affiliated third party, the survey of 350+ Information Technology (IT) professionals assessed their organizations' IoT security practices.

      Read Full Article
    7. Tackling app security to safeguard the future enterprise | Networks Asia | Via IoT

      Tackling app security to safeguard the future enterprise | Networks Asia | Via IoT

      Security Asia, a property of Network World Asia, recently interviewed three IT leaders to gather their thoughts and expert opinions on prevailing cyber security challenges and trends. The interviews were conducted in conjunction with the F5 Anticipate 2016 event in Singapore, which was themed ‘Secure Your Apps Today to Safeguard Your Future’. Kenny Sim is head of IT Infrastructure at Six Capital, which has been described as “a data analytics fintech firm with a contrarian philosophy”.

      Read Full Article
    8. NAPCO Security Technologies, Inc. to Present at the East Coast IDEAS Investor Conference on June 28th in Boston

      NAPCO Security Technologies, Inc. to Present at the East Coast IDEAS Investor Conference on June 28th in Boston

      08:00 ET from NAPCO Security Technologies, Inc. AMITYVILLE, N.Y. , June 14, 2016 /PRNewswire/ -- NAPCO Security Technologies, Inc. (Nasdaq: NSSC ), one of the world's leading solutions providers and manufacturers of high tech electronic intrusion security, IoT connected home, video and fire systems, as well as enterprise-class access control and door locking products today announced that Richard Soloway , President and CEO will present at the East Coast IDEAS Investor Conference on Tuesday June 28, 2016 at the Boston Park Plaza in Boston, Massachusetts . NAPCO's presentation is scheduled to begin at 9:20 A.M. EDT . The presentation will ...

      Read Full Article
    9. Survey Identifies Internet of Things (IoT) Security Challenges for the Connected Enterprise / Majority of Respondents Lack Confidence in Their Ability to See and Control IoT Devices

      Survey Identifies Internet of Things (IoT) Security Challenges for the Connected Enterprise / Majority of Respondents Lack Confidence in Their Ability to See and Control IoT Devices

      Survey Identifies Internet of Things (IoT) Security Challenges for the Connected Enterprise / Majority of Respondents Lack Confidence in Their Ability to See and Control IoT Devices CAMPBELL, CA -- (Marketwired) -- 06/14/16 -- ForeScout® Technologies, Inc., the pioneer in agentless cybersecurity, today announced the findings of its new "Enterprise Internet of Things (IoT) Survey."

      Read Full Article
    10. Nokia : launches new IMPACT platform for fast and secure delivery of IoT services

      Required fields

      erators, enterprises and governments a secure platform on which to scale new IoT services. IMPACT handles data collection, event processing, device management, data contextualization, data analytics, end-to-end security and applications enablement for any device, any protocol and across any application. : Being cloud-based, customers can add on-demand server capacity to support massive numbers of connected devices.

      Read Full Article
    11. What a smart security system can do for your small business – Help Centre

      What a smart security system can do for your small business – Help Centre

      What a smart security system can do for your small business Morepork Support Team June 14, 2016 03:56 When it comes to security, most small businesses are looking for a system that detects intruders via sensors, sounds an alarm when triggered and can notify a monitoring station. Thanks to new technology you can get that protection, as well as completely new features a traditional system can’t provide.

      Read Full Article
    12. Understanding the Internet-of-Things Security Dilemma in 15 Slides | Fox Business

      Understanding the Internet-of-Things Security Dilemma in 15 Slides By Keith Noonan Analyzing the wave of new data from the Internet of Things (IoT) promises to unlock greater efficiency and improvements across industries. However, the growth of device connectivity and machine-to-machine communicationalso brings with it some serious security challenges.

      Read Full Article
    13. CISO challenges: Identifying and addressing common problems

      CISO challenges: Identifying and addressing common problems

      CISO challenges: Identifying and addressing common problems by Enterprises often struggle to identify and prioritize the most pressing security concerns and threats. Sean Martin explains the common CISO challenges facing organizations today. This Article Covers Related Content Security: Communicating to the Board of Directors and Evaluating Vendors' ... –BitSight As more companies fill the CISO position, this executive-level role appears to be getting closer to the rest of the C-suite in terms of business responsibilities. But some CISOs meet the challenge of working with their C-level counterparts, while others remain stuck trying to bridge that communication gap between technology and the ...

      Read Full Article
    14. Covata Appoints Executive Pavan Singh From Cisco to Spearhead IoT Business

      Covata Appoints Executive Pavan Singh From Cisco to Spearhead IoT Business

      SAN FRANCISCO, CA --(Marketwired - June 13, 2016) - Covata Limited ( CVT.AX ) , a global leader in data-centric security solutions for enterprises, has appointed industry expert Pavan Singh to join the rapidly growing San Francisco office where he will spearhead the company's IoT security solution Key-as-a-Service (KaaS™). Pavan has over 15 years experience in the technology industry.

      Read Full Article
    15. Symantec to buy Blue Coat for US$4.7 billion to boost enterprise unit

      Symantec to buy Blue Coat for US$4.7 billion to boost enterprise unit Technology security firm Symantec Corp said it would buy privately held cyber security company Blue Rayani Air licence revoked - therakyatpost 50 killed in Florida gay nightclub shooting - Xinhua Hong Kong nurses found guilty of misconduct in fatal blunder plead for leniency - Scmp Brazil suffer shock defeat to Peru, eliminated from the Copa America - espnfc.co Unai Emery to replace Laurent Blanc at PSG?

      Read Full Article
    16. OCBC wants clients to install security software, Banking

      OCBC wants clients to install security software, Banking

      OCBC has asked some of its corporate banking clients to download security software, and if they fail to comply the bank will close their accounts. This was done to guard against potential malware attacks, the bank said. However, the move riled some of the bank's small and medium-sized enterprise (SME) customers, who were unhappy about the way the message was conveyed.

      Read Full Article
    17. Soon you won't need to carry multiple documents for air travel

      Soon you won't need to carry multiple documents for air travel

      Jun 12, 2016, 05.25 PM | Source: PTI Soon you won't need to carry multiple documents for air travel Airline solutions and technology provider SITA is exploring the potential of newly-emerging 'blockchain' technology to provide travellers with a 'secure single token' which was previewed at the 2016 Air Transport IT Summit, Barcelona, Spain.

      Read Full Article
    601-624 of 651 « 1 2 ... 23 24 25 26 27 28 »
  1. Register to our Newsletter

    Enter your e-mail address for receive the top headlines.

     

    This newsletter aggregates all the latest IoT news from around the world. Sign up for a daily or a weekly newsletter here.

  2. Latest Tweets

  3. Categories

    1. Curation Categories:

      All News, Big Data News, Cellular IoT, Data, Enterprise, Enterprise Solutions, Fragmentation, Healthcare, Insurance, IoT Security News, Monetizing IoT, Professional Services, Public Spaces, Retail, Security, Transport
  4. Monetizing IoT
  5. Popular Articles