Eurosmart calls for European cybersecurity enforcement framework

(c)iStock.com/caracterdesign

Brussels-based international digital security association Eurosmart is asking for a European cybersecurity enforcement framework, along with the promotion of a European Internet of Things (IoT) trust label and security certification. The organisation advocates a cybersecurity trust label or security certificate for every IoT provider that not only covers data, but also the network used by IoT providers.

Eurosmart has also established a new body called the ‘IoT Security...

By IoT News, 02 November 2016, 0 comments. Categories: Enterprise, IoT, Security.

Why the IoT is neither ‘new’ nor ‘revolutionary’ – and why data security is the highest priority

(c)iStock.com/serkorkin

Jim Hunter, chief scientist at Greenwave Systems, has told delegates at the recent Broadband World Forum that protection of consumer and security of data should be taken seriously and should be at the heart of developing propositions for the Internet of Things (IoT).

The presentation, titled “The Internet of Things about you: Evolving from data to content and what you can do”, advised the audience that the IoT is all about personal data, as the real opportunity is in...

By IoT News, 21 October 2016, 0 comments. Categories: Data & Analytics, IoT, Security.

Gemalto and Alibaba team up for China IoT security

(c)iStock.com/Sky_Blue

Digital security provider Gemalto has announced it is partnering with Chinese eCommerce giant Alibaba to help secure the country’s IoT ecosystem.

The company is providing connectivity and security for YunOS, a cloud-based IoT operating system developed by Alibaba. Gemalto will provide its Allynis Trusted Service Hub, an interconnected platform traditionally aimed at banks, car manufacturers, transport operators and other service providers, as its part of the...

By James Bourne, 17 October 2016, 0 comments. Categories: IoT, Security.

Cloud Security Alliance outlines 13 steps to developing secure IoT products

(c)iStock.com/AnthiaCumming

The Cloud Security Alliance (CSA) has outlined a series of best practice guidelines to help IoT designers and developers understand various security measures.

Comprising a baker’s dozen of tips, the document ranges from protecting data, to implementing secure authentication, to secure key management. Naturally, these can be seen as fairly standard security tips, but the report notes that the guidance is not meant “as a substitute for understanding fundamental system...

By James Bourne, 13 October 2016, 0 comments. Categories: Development, IoT, Security.

IoT, big data, fog computing, and how the work of today can shape tomorrow

(c)iStock.com/Matej Moderc

The future technological landscape will, according to the experts, be one where driverless vehicles zoom around and cater to passengers’ whims, just one of billions of connected devices. But how can a vision for 2030 be relevant to today’s needs?

Doug Zuckerman is conference chair of the IEEE Technology Time Machine, taking place later this month in San Diego. The conference covers as its key areas big data, brain – how technology can...

By James Bourne, 07 October 2016, 0 comments. Categories: Enterprise, IoT, Security, Standards.

IoT malware attacks becoming more sophisticated – with China and US at the source

(c)iStock.com/sigurcamp

Malware and DDoS attacks targeting the Internet of Things (IoT) have “come of age”, according to research released by security provider Symantec – with the US and China at the forefront of it.

The report examines how cybercriminals are taking advantage of unsecured IoT devices to spread malware and create zombie networks or botnets. China (34%) and the United States (28%) were the most frequent attack origins on Symantec’s specific IoT honeypot by count of...

By IoT News, 28 September 2016, 0 comments. Categories: IoT, Security.

The legal issues with IoT – and the security risks of boundless data

(c)iStock.com/Crews

Data security is a key concern with the Internet of Things, taking into account just how much data can be collected. With various IoT devices talking to each other, the potential for a data security breach is high and with more and more IoT devices coming onto the market, this issue is not going to go away. 

For example, take the smart meter initiative led by the UK government. The intention is that by 2020, over 53 million smart meters shall be...

By Sarah Hall, 01 September 2016, 0 comments. Categories: Data & Analytics, IoT, Security.

Securing data for the IoT: A best practice guide

(c)iStock.com/MilesSherrill

With billions of new connections expected in the next decade, it has never been more important to design solutions for trust. Fears about security are a major barrier to the adoption of IoT solutions. The potential to disrupt or even close-down operations, to steal personal or financial data, and peek at industrial secrets and intellectual property pose an ever-present danger. Fortunately, it is becoming easier than ever to build robust...

By Andrew Pockson, 17 August 2016, 0 comments. Categories: IoT, Security.

John Deere: On partnerships, collaboration and security in IoT for agriculture

(c)iStock.com/Steve Debenport

“For us, it starts with the ability to precisely guide a machine – and then we are trying to put more and more smarts into everything we build.”

That one sentence from Lane Arthur (left), director of the Information Solutions Group at agricultural manufacturing giant John Deere, adequately sums up the company’s technological manoeuvres. For a firm which was founded in...

By James Bourne, 15 August 2016, 0 comments. Categories: Enterprise, IoT, Security.