IOT CATEGORIES
MOST POPULAR TAGS

Vendor




Episode 34

I’m sold. In fact I’ve been sold since early 2014 when I first started digging into the emerging Low Power Wide Area (LPWA) market. I’m sold not because it’s cool tech – I’m sold because its affordable. The price makes business sense for a wide range of IoT use cases – some we’re familiar with and others we haven’t even considered yet due to current cost structures.
Listen to this podcast (or read the transcript) with Hardy Schmidbauer of the LoRa Alliance and Thomas Nicholls of Sigfox about what LPWA is and the different ways it’s sold ...


Because of where we are in the evolution of Internet of Things systems it’s not possible to simply bolt on a firewall or Intrusion Detection System. Unlike in IT, in IoT, security must be considered from the beginning as part of the product/system design. But it doesn’t mean we can’t apply some of the same techniques used by our IT brethren. Take for example network traffic analysis. It’s a hot IoT security trend that I’ve written about before but now it’s not just start-ups that are getting into the act - large companies like Symantec are planning to bring all their experience in security analytics to bear on the foes of IoT.
Watch this video (or read the transcript with Brian Witten about intrinsic security, security analytics and his four cornerstones of Internet of Things security ...




Episode 33

The more I dig into it, the more I’m convinced that privacy is a bigger issue than security in IoT. Don’t get me wrong, the challenges facing IoT security are huge and in many cases, unchartered but, we’ll figure them out. Why? Because we’re good at figuring out tech. What’s going to be more challenging is teasing out the rules of engagement from the tangled web of IoT privacy. This involves people, companies, special interests and the law – much more difficult and with huge business implications.
Listen to this podcast (or read the transcript) with privacy philosopher Justin Klein Keane about the challenges we face and some mental frameworks in which to consider them ...


Most of what we read about IoT security and privacy is doom and gloom. I get it, playing on people’s fears is a proven way to get a click. Well there’s some good news too. Losing the typical UI for authentication and authorization can improve security. For example, machines don’t care if they must use 128-bit passwords. And since IoT devices are relatively simple, their traffic patterns are more predictable and therefore easier to examine for security breaches.
Watch this video (or read the transcript) to see May Wang describe the current state of security and how her start-up analyzes traffic patterns to make IoT safer ...




Episode 31

Although an integral part of IoT security, IoT privacy doesn’t rely on technology. It relies instead on self-imposed business rules that govern the way the collected data is used within and outside of the enterprise. As with many things tech, government and law is unable to keep up with the innovation of IoT and with what some call its digital exhaust.
Listen to this podcast (or read the transcript) with privacy expert Dale Smith about the top 5 best practices in handling personally identifiable information (PII) and other IoT privacy issues ...




Episode 30

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part two of a two part interview ...




Episode 29

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part one of a two part interview ...


Getting your arms around the IoT platform is still a challenge, mostly because the definition is still evolving. However if you squint your eyes a platform is either used for managing devices, managing backhaul communications or developing applications. And it lives in the cloud or on-prem or in both places at the same time. Using scope and topology is the first step in narrowing down the field while shopping for your platform.
Watch this video (or read the transcript) to see Ken Forster expertly classify IoT platforms in terms of scope and topology and describe what he considers most important when making a buying decision ...




Episode 27

Descriptive analytics is nothing new, however IoT is applying evolutionary forces to make it adapt to unstructured sensor data and evolve into a mechanism of discovery rather than report generation. Tools that blend traditional business intelligence, analytical modeling and visualization now help data scientists discover the story behind the data which can lead to valuable insights for the enterprise.
Listen to this podcast (or read the transcript) with Dave Rubal about how to apply descriptive analytics to your Internet of Things ...