Gemalto and Alibaba team up for China IoT security

(c)iStock.com/Sky_Blue

Digital security provider Gemalto has announced it is partnering with Chinese eCommerce giant Alibaba to help secure the country’s IoT ecosystem.

The company is providing connectivity and security for YunOS, a cloud-based IoT operating system developed by Alibaba. Gemalto will provide its Allynis Trusted Service Hub, an interconnected platform traditionally aimed at banks, car manufacturers, transport operators and other service providers, as its part of the...

By James Bourne, 17 October 2016, 0 comments. Categories: IoT, Security.

Cloud Security Alliance outlines 13 steps to developing secure IoT products

(c)iStock.com/AnthiaCumming

The Cloud Security Alliance (CSA) has outlined a series of best practice guidelines to help IoT designers and developers understand various security measures.

Comprising a baker’s dozen of tips, the document ranges from protecting data, to implementing secure authentication, to secure key management. Naturally, these can be seen as fairly standard security tips, but the report notes that the guidance is not meant “as a substitute for understanding fundamental system...

By James Bourne, 13 October 2016, 0 comments. Categories: Development, IoT, Security.

IoT, big data, fog computing, and how the work of today can shape tomorrow

(c)iStock.com/Matej Moderc

The future technological landscape will, according to the experts, be one where driverless vehicles zoom around and cater to passengers’ whims, just one of billions of connected devices. But how can a vision for 2030 be relevant to today’s needs?

Doug Zuckerman is conference chair of the IEEE Technology Time Machine, taking place later this month in San Diego. The conference covers as its key areas big data, brain – how technology can...

By James Bourne, 07 October 2016, 0 comments. Categories: Enterprise, IoT, Security, Standards.

IoT malware attacks becoming more sophisticated – with China and US at the source

(c)iStock.com/sigurcamp

Malware and DDoS attacks targeting the Internet of Things (IoT) have “come of age”, according to research released by security provider Symantec – with the US and China at the forefront of it.

The report examines how cybercriminals are taking advantage of unsecured IoT devices to spread malware and create zombie networks or botnets. China (34%) and the United States (28%) were the most frequent attack origins on Symantec’s specific IoT honeypot by count of...

By IoT News, 28 September 2016, 0 comments. Categories: IoT, Security.

The legal issues with IoT – and the security risks of boundless data

(c)iStock.com/Crews

Data security is a key concern with the Internet of Things, taking into account just how much data can be collected. With various IoT devices talking to each other, the potential for a data security breach is high and with more and more IoT devices coming onto the market, this issue is not going to go away. 

For example, take the smart meter initiative led by the UK government. The intention is that by 2020, over 53 million smart meters shall be...

By Sarah Hall, 01 September 2016, 0 comments. Categories: Data & Analytics, IoT, Security.

Securing data for the IoT: A best practice guide

(c)iStock.com/MilesSherrill

With billions of new connections expected in the next decade, it has never been more important to design solutions for trust. Fears about security are a major barrier to the adoption of IoT solutions. The potential to disrupt or even close-down operations, to steal personal or financial data, and peek at industrial secrets and intellectual property pose an ever-present danger. Fortunately, it is becoming easier than ever to build robust...

By Andrew Pockson, 17 August 2016, 0 comments. Categories: IoT, Security.

John Deere: On partnerships, collaboration and security in IoT for agriculture

(c)iStock.com/Steve Debenport

“For us, it starts with the ability to precisely guide a machine – and then we are trying to put more and more smarts into everything we build.”

That one sentence from Lane Arthur (left), director of the Information Solutions Group at agricultural manufacturing giant John Deere, adequately sums up the company’s technological manoeuvres. For a firm which was founded in...

By James Bourne, 15 August 2016, 0 comments. Categories: Enterprise, IoT, Security.

A four step plan to secure the Internet of Things

(c)iStock.com/StockFinland

The Internet of Things revolution is gearing up to dramatically alter various industrial sectors including manufacturing, healthcare, energy and transportation, which together account for nearly two-thirds of the global GDP. While this promises to bring unprecedented opportunities to business and society, it also opens up various vulnerabilities and security threats. We have already heard news of baby monitors, medical gadgets and smart lights being either hacked or proven...

By Sukamal Banerjee, 03 August 2016, 1 comment. Categories: Development, IoT, Security.

ARM boosts IoT security team in Israel with recruitment drive

(c)iStock.com/anyaberkut

ARM has recruited almost 40 engineers at its Internet of Things (IoT) engineering team at the Kfar Netter design centre in Israel.

These employees will work with the 90 engineers who joined ARM from Sansa Security in 2015. This development ensures the design centre is among ARM's top ten design centres by size. The centre is providing a base for work on ARM security products such as ARM TrustZone technology and SecurCore processor IP.

Mike Muller, chief technology officer at ARM,...

By IoT News, 02 August 2016, 0 comments. Categories: IoT, Security.

Netclearance boosts workforce IoT space with “mBeaconCard” smart badge

Picture credit: Netclearance

Netclearance has introduced a wearable identity card that facilitates access control, indoor location tracking and contactless payments.

Known as the mBeaconCard, the smart badge contains Bluetooth LE and NFC chips that work with designated readers to facilitate workforce analytics. The mBeaconCard is an application of workforce IoT with its features covering employee safety.

The mBeaconCard aims to make smartphone apps or key fobs redundant as it allows employers in institutions...

By IoT News, 27 July 2016, 0 comments. Categories: Enterprise, IoT, Security.