Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the year 2015 has IoT enthusiasts particularly excited. This year, IoT has taken center stage at… [read more]
Security, privacy and data management hold back the monetisation of IoT apps, but developers says 80% will generate revenue by 2018. Almost two-thirds of Internet of Things (IoT) applications in production today are generating revenue, new research had revealed.
To protect data against growing threats, networks must now act as both sensor and enforcer around traffic that passes through users and data centers to the cloud. There has definitely been a digital disruption within our industry.
Have you put much thought lately into what’s stored in your garage? If you have valuables in there next to your car, you might want to think about the hacking potential of your garage door. As it turns out, even your children’s old toys can be ideal for hacking into your home.
Growing awareness of the Internet of Things has brought with it a desire amongst those building embedded systems to include some form of connectivity. But, as some of those designers have already found out to their cost, providing connectivity is one thing; providing security for such a system is another.
The Internet of Everything’s (IoE) promise to create a more connected and transformed world comes closer to reality on a daily basis. Cisco predicts that 50 billion devices will be connected by the year 2020. But as devices bridge the physical and digital worlds, security challenges arise.
Wearable technologies promise to be one of the technology trends of 2015 that will receive a great deal of attention from the mainstream technology press thanks in large part to the major corporate players looking to enter that field, including Apple and Samsung.
Google is toying with the idea of scoring smart homes on how secure they are. “The security score may be generated based on processed home data that may include at least one of various types of data, including, but not limited to, capability data, opportunity data, and environmental data,” the application reads.
Tangible Security’s Michael Baucom, VP of R&D, was interviewed and quoted in CSO Online regarding the cyber security related search engine called Shodan and its relevance to enterprise cyber security. Shodan is speaker at the IoT Event!
Projections for the upcoming sales of new wearable devices such as the Apple Watch are strong, with some firms predicting that sales of wearables could reach 130 million units in 2018. So what will all of these new devices mean for the enterprise?