Sixteen mobile network operators around the world have agreed to use a common security framework for the internet of things that was developed by the GSMA.
According to the GSMA, carriers which have signed on to use its GSMA IoT Security Guidelines include AT&T, China Mobile,...
The recent data privacy scandal surrounding Facebook and Cambridge Analytica has opened up an interesting period of collective soul-searching regarding huge tech firms that operate utilizing “big” data. The overarching question that is being asked and, frankly, still needs to be answered is “what...
IoT device manufacturers are governed by a keen consumer demand for desirable features and intuitive functionality. Security concerns, in stark contrast, have been given relatively little thought — especially among lower-end consumer IoT products. However, striking a more equitable balance between ease of use...
As large-scale, automated "botnet" attacks become a matter of increasing concern for the internet of things, the U.S. Department of Commerce and the Department of Homeland Security are looking for insights on how to prevent and address such attacks.
The department recently released a draft...
Take a deep dive into the pitfalls and practicalities of Industrial IoT security
The industrial IoT will usher in a fourth industrial revolution, and raise a storm. Manufacturing and distribution businesses anchored by old systems and processes will be drowned by the rising tide; those...
Conformity is everything in the fight against cyber-crime. Traditionally, the way to secure IT systems has been to “bring everything together, and keep everything the same”, remarks Senthil Ramakrishnan, lead member of technical staff at AT&T.
But the internet of things (IoT) confounds this...
The internet of things (IoT) has turned the industry’s traditional security model of isolationism on its head. Suddenly, devices and systems, until now segregated by physical locks and operational air-gaps, are easily accessible.
“In IT, servers are locked away in data centers where only...
There are security vulnerabilities throughout the IoT supply chain, stretching right back to sourcing components. Enterprise users, particularly those engaged in industrial operations and critical operations, should review and monitor their IoT suppliers, and work with trusted and reputable partners.
“The largest challenge for...
The most significant challenge for the internet of things (IoT) is device security. Without question, devices represent the weakest link in the IoT technology stack, the industry reckons.
“This is because devices are constrained in battery and computing power,” notes Carlos Carazo, director of...
And how the industry is failing to learn from its mistakes
The technology industry is failing to learn from its mistakes, as familiar security failings from the IT space hobble the nascent internet of things (IoT) market, and threaten its growth.
A glance at top...
The Japanese firm said the system detects and prevents cyber attacks in connected and autonomous cars
Panasonic Corporation announced the development of an automotive intrusion detection and prevention systems to prevent cyberattacks in autonomous and connected cars.
Panasonic said its newly developed system will ensure safe...
Speaking from the Wireless Infrastructure Association's HetNet Expo in West Palm Beach, Fla., Verizon Vice President of IoT Connected Solutions Mark Bartolomeo highlighted why, after more than a decade of pushing, the internet of things is finally seeing widespread adoption by enterprises of all...
Intel launches Secure Device Onboard service during IoT Solution World Congress
Regardless of where you get your projections, they all agree that the internet of things (IoT) will quickly grow to comprise multiple billions of devices, everything from smart home lighting and AI assistants to...
Abbott Labs recall impacts six different pacemaker models
The U.S. Food and Drug Administration (FDA) issued a recall of nearly half a million pacemakers out of concern that IoT security loopholes could allow hackers to breach the internet of things (IoT) health care devices. The...
A study commissioned by Inmarsat revealed most energy companies have concrete plans to deploy IoT
New research commissioned by Inmarsat finds that more than a third of energy companies around the world lack the skills they need at both a management and a delivery level...
The Korean telco said the new chips will improve security of IoT products
Korean telecommunications firm SK Telecom announced the development of a prototype of an ultra-small quantum random number generator (QRNG) chip.
SK Telecom said that QRNG generates true random numbers without any kind of...
The Swiss company will integrate its products in the manufacturer’s connected car solutions
Swiss cybersecurity and internet of things (IoT) company WISeKey announced a contract with an unnamed European car manufacturer for development of connected car technology.
The agreement includes the integration of the WISeKey IoT...
Verizon and AT&T execs talk IoT security
In a new interview with Mobile World Live, Verizon Global Lead of IoT Security and International Strategy Harm Jan Arendshorst highlighted the security challenges associated with the explosion of network endpoints as the internet of things (IoT) continues...
Verizon and AT&T execs talk IoT security
In a new interview with Mobile World Live, Verizon Global Lead of IoT Security and International Strategy Harm Jan Arendshorst highlighted the security challenges associated with the explosion of network endpoints as the internet of things (IoT) continues...
Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...
Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...
The report also showed that IoT breaches can cost up to 13% of the smaller firms´ annual revenues
Nearly half of U.S. firms using an internet of things (IoT) network have been hit by a recent security breach, according to a study by consulting firm...
"Much of what is already out there is unsecured"
Hacking and malware remain the primary vectors for cybersecurity attacks, according to the new Verizon Data Breach Investigations Report, and internet of things security is increasingly top-of-mind in the wake of a number of high-profile breaches late...
Securing the enterprise for IoT
Moderator Steve Brumer is joined by Paul Jauregui, VP Marketing, Praetorian; Jon Clay, Sr. Global Marketing Manager, Technology and threat Marketing, Trend Micro; Dr. Shane Rooney, IoT Executive Director, GSMA and Mahesh Kodukula, Market Segment Manager of IoT, 7layers
https://youtu.be/uofzuaS2njg
Steve Brumer, Partner at 151 Advisors...