Search Results

Search results for: data security

Security of Things World USA 2016

Event date: November 3 – 4, 2016
Hard Rock Hotel San Diego

Exploring Security and the Internet of Things. A world class event focused on the next information security revolution. Be part of Security of Things World USA on November 3-4 in San Diego, CA to tailor your proposition to respond to the security concerns that preoccupy enterprises today and find pragmatic solutions to the most common security threats. Connect with over 300 peers to learn, network and share best practice strategies at the only dedicated forum where all stakeholders who play an active role in the security of IoT come together. (more…)

Read more

October 11, 2016

Posted by: IoT global network

Cloud-based monetisation provider enables IoT data services in connected cars

Aria Systems, has announced Aria for Connected Vehicles, a cloud-based offering for IoT-enabled connected cars, heavy equipment, on-demand transportation as a service, telematics, and post-sale/lease add-on services. (more…)

Read more

September 23, 2016

Posted by: Avadhoot Patil

Telit updates IoT portal so users can switch network providers ‘on the fly’ and ensure data continuity

Telit, a global enabler of the Internet of Things (IoT), has announced major updates to their IoT Portal. Now, users can switch network providers on the fly, ensure data continuity, (more…)

Read more

September 19, 2016

Posted by: Avadhoot Patil

How to cope with security’s lost perimeter

As the Internet of Things becomes a reality and revolutions such as smart cities, digital manufacturing and connected vehicles are proliferating, the number of data points that could potentially be attacked by hackers are also rising at a staggering pace, writes Pavan Singh, the vice president and business head of the data security platform at Covata. Indeed, Gartner predicts that by 2020 there will be 9.7 billion connected devices, all of which represent a possible entry point for an attacker. (more…)

Read more

September 16, 2016

Posted by: George Malim

IoT testing: How heavy emphasis on security can save your brand millions?

The Internet of Things interconnects various devices and they all can store data. Any data residence is a potential threat to security and we have to address these issues carefully not giving a chance to cyber-attackers. With so many various devices in the internet of things, we have to be more versatile in terms of choosing the right protection measures, writes Alex Seryj, the editor in chief of QArea. (more…)

Read more

September 13, 2016

Posted by: George Malim

Data protection and thecoming General Data Protection Regulation

Data protection is a fundamental concern to all organisations which hold personal information in the UK. Breaching the Data Protection Act (DPA) would have serious consequences for their business – fines, bad publicity and even criminal sanctions, writes James Wickes, the chief executive and co-founder of Cloudview. (more…)

Read more

September 6, 2016

Posted by: George Malim

The IoT and perimeter security: a hole in the wall? – Part Two

In the first part of this two-part series, Tyco’s Simon Gawne examined the technical obstacles to a cyber-secure IoT-based security network. Here, he outlines the cultural changes which organisations must go through if they are to ensure that every entry point is effectively guarded. (more…)

Read more

September 1, 2016

Posted by: George Malim

The IoT and perimeter security: a hole in the wall? – Part One

The Internet of Things (IoT) is playing an increasingly large role in physical security, as perimeter-guarding devices such as CCTV and access management begin to take advantage of IP-based communications. Devices now have the power to share information faster than ever before and across a far wider physical area – but how secure are the security devices themselves? In a two-part series, Simon Gawne, director of integrated solutions and innovation at Tyco, investigates the need for security teams to consider not only the man outside the gate, but also the ghost in the machine, as hackers attempt to exploit vulnerable system backdoors. (more…)

Read more

August 31, 2016

Posted by: George Malim

Re-engineering security for the IoT

From delivery vehicles to ATMs, air conditioning systems to CCTV cameras, the scope for commercial IoT appears to be as big, if not bigger than, the comparable consumer opportunity, writes Klaus Gheri, the vice president and general manager for network security at Barracuda Networks. However, for the business world, the IoT faces a major barrier to adoption: in their current state, the tools that help businesses deploy and secure IoT devices are simply not fit for purpose.  (more…)

Read more

August 30, 2016

Posted by: George Malim

Teradata Aster Analytics speeds time to value to benefit users of big data on Hadoop and AWS

Analytics solutions company, Teradata Corp., has announced new deployment options for Teradata Aster Analytics: Teradata Aster Analytics on Hadoop and Teradata Aster Analytics on Amazon Web Services (AWS). (more…)

Read more

August 26, 2016

Posted by: Avadhoot Patil