IIoT security: critical importance, under-addressed
The industrial internet of things presents a cybersecurity concern of a scale we have never before seen. Its premise alone – making every "thing" around us connected to a network – is enough to spur the imagination of entire environments...
The dangers of an insecure IIoT system
Wired detailed the frightening consequences of vulnerable computer-based systems in its 2008 article Industrial control systems killed once, and will again, experts warn. With the expansion of “smart devices” into the automobile and medical industries, those predictions are more...
Enterprises harnessing the IoT will need to strike a careful balance between security and power consumption
Amid all the buzz about the arrival of low power wide area (LPWA) connectivity and IoT devices that can function for a decade on a single battery charge, there...
IoT security spending is set to increase by nearly 30% this year. Cybersecurity startups to benefit from surge in investment as funding is expected to soar.
"Internet of Things" security spending is currently a relatively small market, but analyst firm Gartner estimates worldwide spending on...
The lack of IIot security investments could put UK manufacturers at risk from cyber threats.
A majority of UK manufacturers, 62 percent, have plans to increase their investments in internet-connected capital equipment in the next five years as they transition to industry 4.0. However, investment plans...
Goldman Sachs views IoT as the third “internet” wave while predicting that IoT will exceed preceding internet waves by connecting 28 billion “things”. By extending mobile and wireless “pipes”, IoT will unlock product innovation, create new business models and expose networks to unprecedented level...
https://youtu.be/MvTYlAw0uQ4
Today's IoT Innovation episode brought to you by Anritsu and Telecomcareers
IoT pundits and experts, Chris Hare and Steve Brumer, join host Jeff Mucci for a rousing discussion on IoT trends and news. Specific topics include:
"Internet of data versus 'Internet of Things,'" a term first...
https://www.youtube.com/watch?v=4dmHck4HoBA
This week on on IoT Innovation, UltraSOC CEO, Rupert Baines, joins host Jeff Mucci, for a thoughtful discussion on the following top IoT trends:
• IoT Wireless Network Wars - Licensed versus unlicensed IoT network connectivity. Specifically, how long range, low power (ie Sigfox, LoRa, Silver...
WASHINGTON – As the "Internet of Things" becomes a staple of the conversation across all aspects of the economy, there’s a growing concern around how to secure all these new connections.
At the recent Federal Building Council event, many participants analogized that creating an IoT network is...
A well-publicized hack of a 2014 Jeep Cherokee earlier this year by security experts working with Wired magazine resulted in the recall of 1.4 million vehicles by Fiat-Chrysler Automobiles, a hasty (and successful) network-level fix pushed out by Sprint to address the vulnerability, and...
How does US government IoT policy stack up with the rest of the world? According to IoT Pioneer Kevin Ashton, and other sources, US government lagging behind China, Germany, EU and soon to be S. Korea
America Last? is the title of an article Kevin...
Researchers have discovered they can hack voice over LTE implementations on two tier-one mobile carrier networks, gaining access to free data usage or shutting down voice or data access for another user.
A recently published paper (pdf) by academics at the University of California Los Angeles, The...
IoT connection management eSDK platform opens APIs for network, security and data development
During the two-day Huawei Developers Congress, which was attended predominantly by the enterprise developer community, the company showcased a number of network APIs and "Internet of Things" initiatives for the Internet of vehicles, safe city, smart...
Connected car hack research extends reach
I recently had an opportunity to speak with Martin Hunt, BT Global Services' automotive industry practice lead, at the CyberSecure Car 15 conference in Dresden, Germany. While ethical hacking is not normally a topic one associates with BT Global Services, the...
Last week, Dresden was host to the CyberSecure Car 15 conference with experts from the automotive and security markets discussing the topic in detail. The two-day conference covered many interesting topics and some of the highlights are included in this overview.
One interesting topic posed...
Booz Allen may not be a name that immediately comes to mind when thinking about automotive cybersecurity, but it should as the company has a practice that looks specifically at security. A team of automotive and cybersecurity experts work with automotive original equipment manufacturers...
WASHINGTON – Two Democratic members of the Senate Committee on Commerce, Science, and Transportation have sent letters to the CEOs of 18 major automakers asking that they conduct a comprehensive overview of vehicles' vulnerabilities to hacking, and elaborate on what they are doing to...
Public Wi-Fi can be a great way to have your personal data compromised
With mobile data use exploding, Americans are increasingly at risk of compromising personal information as a function of using unsecured networks including public Wi-Fi.
According to a new survey conducted by the American...
IoT is a hot topic at National Instruments' ongoing NI Week
AUSTIN, Texas – National Instruments kicked off its annual NI Week on Aug. 3, and among the first round of presentations was a forward-looking panel discussion about the future of the "Internet of Things."
Moderated...
Connected cars require interoperability to be truly connected
As the goal for car-to-x functionality becomes closer to reality in the world of connected cars, the issue of interoperability plays a big role. Most automotive OEMs are working on interoperability at some level, but the communication...
It’s been a busy few days in the world of connected cars on many fronts. There’s been a live-hack, the crash of an autonomous car resulting in injuries and the discovery of a city that exists solely for the purpose of connected car testing.
Let’s...
Nokia/KT to develop LTE-M field trial in Q4
South Korean telecom operator KT has set up the country's first "Internet of Things" lab in association with Nokia Networks. The new lab will provide IoT-related technical expertise and knowledge to small and medium-sized partner companies to lay...
LoJack thinks so. I recently had the opportunity to speak with LoJack about the current state of vehicle theft and the implications of connected vehicles. Although one can’t say with absolute certainty that connected cars pose a higher threat for thieves, you also can’t...
DARPA researchers plan to demo vulnerability of connected car at conferences
WASHINGTON – Cybersecurity researchers Charlie Miller and Chris Valasek, funded by the federal government, announced they will publicly hack a connected car or truck.
The duo received a 2013 grant from the Defense Advance Projects...