Search Results

Search results for: IoT security

Security of Things World USA 2016

Event date: November 3 – 4, 2016
Hard Rock Hotel San Diego

Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World USA on November 3-4 in San Diego, CA to tailor your proposition to respond to the security concerns that preoccupy enterprises today and find pragmatic solutions to the most common security threats. Connect with over 300 peers to learn, network and share best practice strategies at the only dedicated forum where all stakeholders who play an active role in the security of IoT come together. (more…)

Read more

October 11, 2016

Posted by: IoT global network

The Backstory of IoT

The possibilities that the Internet of Things offers are endless, but so are the potential consequences. As IoT applications become more life critical, the ability to effectively manage the resulting data traffic becomes (more…)

Read more

October 5, 2016

Posted by: Avadhoot Patil

Hacker releases source code of Mirai DDoS Trojan after targeting the IoT this weekend

Over the weekend, a code was reportedly employed on a large number of Internet of Things (IoT) connected devices to form a botnet. The botnet was then deployed to attack websites with a distributed denial of service (DDoS) attack. (more…)

Read more

October 3, 2016

Posted by: Avadhoot Patil

IoT ecosystem ‘advances significantly’ with new global standards from oneM2M

The full potential of the Internet of Things (IoT) advanced significantly as oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT, published a new landmark set of specifications, Release 2. (more…)

Read more

October 1, 2016

Posted by: Avadhoot Patil

The IoT project manager’s checklist

When developing a new IoT product or service, it is all too easy to allocate so much time and resource to the visible elements – the analytics, web GUI, or the smartphone app – that some of the less sexy but equally critical elements get treated as commodities, writes, Matthew Own, the managing director of M2M Intelligence. (more…)

Read more

September 28, 2016

Posted by: George Malim

Rising economies in Asia, Russia and Brazil help drive growth in cellular IoT connections

Global Cellular Internet of Things (IoT) connections are expected to reach almost 1.22 billion in 2021, according to Beecham Research. (more…)

Read more

September 27, 2016

Posted by: Avadhoot Patil

Cloud-based monetisation provider enables IoT data services in connected cars

Aria Systems, has announced Aria for Connected Vehicles, a cloud-based offering for IoT-enabled connected cars, heavy equipment, on-demand transportation as a service, telematics, and post-sale/lease add-on services. (more…)

Read more

September 23, 2016

Posted by: Avadhoot Patil

Vodafone completes the world’s first trial of standardised NB-IoT on a live commercial network

Engineers from Vodafone and Huawei have completed the first over-the-air connection on a live network using standardised NB-IoT. The commercial trial took place in Madrid, Spain. (more…)

Read more

September 22, 2016

Posted by: Avadhoot Patil

Telit updates IoT portal so users can switch network providers ‘on the fly’ and ensure data continuity

Telit, a global enabler of the Internet of Things (IoT), has announced major updates to their IoT Portal. Now, users can switch network providers on the fly, ensure data continuity, (more…)

Read more

September 19, 2016

Posted by: Avadhoot Patil

How to cope with security’s lost perimeter

As the Internet of Things becomes a reality and revolutions such as smart cities, digital manufacturing and connected vehicles are proliferating, the number of data points that could potentially be attacked by hackers are also rising at a staggering pace, writes Pavan Singh, the vice president and business head of the data security platform at Covata. Indeed, Gartner predicts that by 2020 there will be 9.7 billion connected devices, all of which represent a possible entry point for an attacker. (more…)

Read more

September 16, 2016

Posted by: George Malim