IOT CATEGORIES
MOST POPULAR TAGS

INFRASTRUCTURE IOT




Episode 40

This show is going to be a little different than the 43 that preceded it.
Listen to this podcast (or read the transcript) where I’m going to discuss and analyse each episode to date, in an effort to guide you to the episodes that match your interests or where you are in your research into IoT ...




Episode 36

Ripping out an existing SCADA system and replacing it with an IoT deployment isn’t going to happen any time soon. Whether it’s an oil pipeline or a water processing plant, the job of the OT guys is to keep things flowin’. Although the writing is on the wall, it’s going to take a lot more than the promise of information nirvana to change existing infrastructure.
Listen to this podcast (or read the transcript) with System Integrator Joel Hutton about his experience in applying the thin edge of the wedge to get an IoT pilot going with his clients ...




Episode 34

I’m sold. In fact I’ve been sold since early 2014 when I first started digging into the emerging Low Power Wide Area (LPWA) market. I’m sold not because it’s cool tech – I’m sold because its affordable. The price makes business sense for a wide range of IoT use cases – some we’re familiar with and others we haven’t even considered yet due to current cost structures.
Listen to this podcast (or read the transcript) with Hardy Schmidbauer of the LoRa Alliance and Thomas Nicholls of Sigfox about what LPWA is and the different ways it’s sold ...




Episode 33

The more I dig into it, the more I’m convinced that privacy is a bigger issue than security in IoT. Don’t get me wrong, the challenges facing IoT security are huge and in many cases, unchartered but, we’ll figure them out. Why? Because we’re good at figuring out tech. What’s going to be more challenging is teasing out the rules of engagement from the tangled web of IoT privacy. This involves people, companies, special interests and the law – much more difficult and with huge business implications.
Listen to this podcast (or read the transcript) with privacy philosopher Justin Klein Keane about the challenges we face and some mental frameworks in which to consider them ...


Most of what we read about IoT security and privacy is doom and gloom. I get it, playing on people’s fears is a proven way to get a click. Well there’s some good news too. Losing the typical UI for authentication and authorization can improve security. For example, machines don’t care if they must use 128-bit passwords. And since IoT devices are relatively simple, their traffic patterns are more predictable and therefore easier to examine for security breaches.
Watch this video (or read the transcript) to see May Wang describe the current state of security and how her start-up analyzes traffic patterns to make IoT safer ...




Episode 32

We speak about our offensive game so much that we forget that we need good defense in business too, that is, effectively protecting the value we create. However, and I speak from experience, the shiny new things seem so much more important than the seemingly dull security and privacy. Well, when looked at from a risk perspective, security and privacy all of a sudden becomes the purview of the manager.
Listen to this podcast (or read the transcript) with Paul Dant about IoT risk assessment as well as security by design, threat modeling and other important topics to the manager ...




Episode 31

Although an integral part of IoT security, IoT privacy doesn’t rely on technology. It relies instead on self-imposed business rules that govern the way the collected data is used within and outside of the enterprise. As with many things tech, government and law is unable to keep up with the innovation of IoT and with what some call its digital exhaust.
Listen to this podcast (or read the transcript) with privacy expert Dale Smith about the top 5 best practices in handling personally identifiable information (PII) and other IoT privacy issues ...




Episode 30

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part two of a two part interview ...




Episode 29

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part one of a two part interview ...