IOT CATEGORIES
MOST POPULAR TAGS

Security




Episode 93

Want to incorporate blockchain into IoT? Well, that’s a pretty tall order but you have two ways to go about it. Go it alone to build the world’s best IoT blockchain protocol and hope it’s adopted or join others that have similar goals to build the world’s best IoT blockchain protocol in hopes that it’s adopted.
Listen to this podcast (or read the transcript), where I speak with Zaki Manian about the technology and business advantages of blockchain in IoT and the approach the Trusted IoT Alliance is taking to make them a reality ...




Episode 92

Blockchain. One of the few technologies more hyped than IoT. Put them together and it’s a hypefest. But is it warranted? Honestly, I don’t know but I can tell you, for me, the decision is not going to be based on if it’s cool tech, it’s going to be based on, if that cool tech contributes to making more money.
Listen to this podcast (or read the transcript), where I speak with Jessica Groopman about what blockchain is and how it fits into the Internet of Things ...


Whether the Internet product is a discrete product, a system or infrastructure, more often than not, its end nodes are sitting in the wild – just waiting for a bad actor to get their hands on them. This physical accessibility introduces a new category of attack surfaces that need to be protected against.
Watch this video (or read this transcript) to see Vera Sell discuss edge device vulnerabilities in the Internet of Things and the best practices to follow to secure them ...


Because of where we are in the evolution of Internet of Things systems it’s not possible to simply bolt on a firewall or Intrusion Detection System. Unlike in IT, in IoT, security must be considered from the beginning as part of the product/system design. But it doesn’t mean we can’t apply some of the same techniques used by our IT brethren. Take for example network traffic analysis. It’s a hot IoT security trend that I’ve written about before but now it’s not just start-ups that are getting into the act - large companies like Symantec are planning to bring all their experience in security analytics to bear on the foes of IoT.
Watch this video (or read the transcript with Brian Witten about intrinsic security, security analytics and his four cornerstones of Internet of Things security ...




Episode 33

The more I dig into it, the more I’m convinced that privacy is a bigger issue than security in IoT. Don’t get me wrong, the challenges facing IoT security are huge and in many cases, unchartered but, we’ll figure them out. Why? Because we’re good at figuring out tech. What’s going to be more challenging is teasing out the rules of engagement from the tangled web of IoT privacy. This involves people, companies, special interests and the law – much more difficult and with huge business implications.
Listen to this podcast (or read the transcript) with privacy philosopher Justin Klein Keane about the challenges we face and some mental frameworks in which to consider them ...


Most of what we read about IoT security and privacy is doom and gloom. I get it, playing on people’s fears is a proven way to get a click. Well there’s some good news too. Losing the typical UI for authentication and authorization can improve security. For example, machines don’t care if they must use 128-bit passwords. And since IoT devices are relatively simple, their traffic patterns are more predictable and therefore easier to examine for security breaches.
Watch this video (or read the transcript) to see May Wang describe the current state of security and how her start-up analyzes traffic patterns to make IoT safer ...




Episode 31

Although an integral part of IoT security, IoT privacy doesn’t rely on technology. It relies instead on self-imposed business rules that govern the way the collected data is used within and outside of the enterprise. As with many things tech, government and law is unable to keep up with the innovation of IoT and with what some call its digital exhaust.
Listen to this podcast (or read the transcript) with privacy expert Dale Smith about the top 5 best practices in handling personally identifiable information (PII) and other IoT privacy issues ...




Episode 30

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part two of a two part interview ...




Episode 29

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part one of a two part interview ...


Internet of Things enterprise security needs to be approached holistically across the IoT cloud, network and end devices. Make security part of the plan from the start of the project. Divide responsibilities among the internal team and external partners and hold everyone accountable. Just a few pieces of advice from this video.
Watch this video (or read the transcript) to hear Justin Buchanan’s top 3 enterprise security risks today ...