Quantcast
Channel: Internet of Things – SecurityRoundTable.org
Browsing all 22 articles
Browse latest View live

Don’t Short-Change IoT Security

When we talk about the Internet of Things, it’s easy to get swept away by the sheer magnitude of the IoT market opportunity. After all, the numbers are enormous. More than 20 billion connected things...

View Article



The 6 D’s of Exponential Growth: How and When Cybersecurity Will Become Abundant

This year, I have been fascinated by two books about the near future and how entrepreneurs should think about market opportunities. “Abundance” by Peter Diamandis and Steven Kotler, and “Exponential...

View Article

Get Ahead of Threats: Stay Focused

Everyone understands natural disasters are inevitable, and the economic, human, and social impacts can be enormous, if not deadly. So it’s imperative that representatives from all parts of the...

View Article

3 Cybersecurity IoT Myths

This is not an article about why the Internet of Things is a big business opportunity. You already know that. Nor is it going to be about the fact that IoT initiatives need to account for cybersecurity...

View Article

Trust in Healthcare goes beyond the physical

The concept of zero trust has gained a lot of interest and traction among cybersecurity professionals, and for good reason. As threat vectors expand and the ingenuity of bad actors increases, the...

View Article


6 Degrees of IoT: The Kevin Bacon Theory of Networking

You don’t need to be a student of American cinema to know what the movies “Animal House” and “A Few Good Men” have in common: Kevin Bacon. Most, if not all, of us have heard about the Six Degrees of...

View Article

The Keys to Unlocking the Potential of AI in Health Records

Healthcare is one of the industries that stands at the forefront of reaping dramatic and demonstrable benefits from the increased use of artificial intelligence. AI offers real potential to save lives...

View Article

Want a Secure IoT Experience? Automate, Automate, Automate

OK, let’s get the blah-blah-blah out of the way. IoT is a huge market opportunity. It is transforming how data is created, captured, and harnessed for business advantage. Tens of billions of smart...

View Article


Remember That IoT Is Physical—Not Cyber

Business executives and board members are understandably excited—perhaps even giddy—about the potential for huge business upsides resulting from new Internet of Things (IoT) projects. And why not?...

View Article


Edge Computing Is a Big Deal—Are You Ready for It?

I’m willing to bet my membership in Futurists Anonymous that at least one of your technology executives—CISO, CIO or CTO—has uttered the words “edge computing” in your executive staff meetings or...

View Article

The Growing Role of Machine Learning in Cybersecurity

Today, it’s impossible to deploy effective cybersecurity technology without relying heavily on machine learning.  At the same time, it’s impossible to effectively deploy machine learning without a...

View Article

Image may be NSFW.
Clik here to view.

North Dakota’s Big Cybersecurity Vision

The people of North Dakota have a lot to be proud of. Our state is a leader in agriculture, energy and national defense. We’re believers in humility and modesty—strong Midwestern values that define how...

View Article

Adopting Private 5G Networks? Now, Think Security.

This is the second article in a two-part series on private mobile networks. Part one is about knowing your acronyms.  The next industrial revolution, aka Industry 4.0, is on the horizon. Enterprises...

View Article


NotPetya’s Hard Lessons on SCADA Cybersecurity

Tuesday, June 27, 2017, a morning like any other in Kyiv, hometown of Linkos Group. It’s a small family-run business that supports M.E.Doc, accounting software used by nearly 90% of Ukraine’s domestic...

View Article

Understanding the Basics of IoT Security

When it comes to the Internet of Things (IoT), what you don’t know can hurt you. Organizations of all sizes are rapidly escalating their use of IoT devices for a wide range of business benefits: to...

View Article


Health Care and IoT Security: Your Devices Need a Physical

A robot performs surgery, operated by a doctor who is miles away; a patient swallows a pill containing a monitor that scans the digestive system; even humble stethoscopes and blood-pressure cuffs...

View Article

Smart Cities Are Exciting—Until There’s a Cybersecurity Snafu

The ideas behind “smart cities” are becoming more relevant as leaders in government and business seek innovative ways to respond to the global COVID-19 pandemic.  A recent article in Wired described...

View Article


From Doorbells and Fish Tanks to Nuclear Reactors: Why Focus on IoT Security

As the world grows ever more connected, all our devices are becoming linked together. The activity tracker on my wrist wirelessly uploads data to my smartphone, which in turn controls entertainment...

View Article

The Myths of IoT Security

Conventional thinking about cybersecurity focuses on a basic concept: lock down every computing device in sight in order to keep out hackers, attackers and thieves. However, in a highly connected...

View Article

The Only Way to Secure the IoT Is Zero Trust

Smart toasters, washing machines that can tell the future, and Siri. The Internet of Things is so much more than simply billions of connected things.  IoT is about critical infrastructure, like traffic...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images