IOT CATEGORIES
MOST POPULAR TAGS

Author: Jane A




Episode 33

The more I dig into it, the more I’m convinced that privacy is a bigger issue than security in IoT. Don’t get me wrong, the challenges facing IoT security are huge and in many cases, unchartered but, we’ll figure them out. Why? Because we’re good at figuring out tech. What’s going to be more challenging is teasing out the rules of engagement from the tangled web of IoT privacy. This involves people, companies, special interests and the law – much more difficult and with huge business implications.
Listen to this podcast (or read the transcript) with privacy philosopher Justin Klein Keane about the challenges we face and some mental frameworks in which to consider them ...


Most of what we read about IoT security and privacy is doom and gloom. I get it, playing on people’s fears is a proven way to get a click. Well there’s some good news too. Losing the typical UI for authentication and authorization can improve security. For example, machines don’t care if they must use 128-bit passwords. And since IoT devices are relatively simple, their traffic patterns are more predictable and therefore easier to examine for security breaches.
Watch this video (or read the transcript) to see May Wang describe the current state of security and how her start-up analyzes traffic patterns to make IoT safer ...




Episode 32

We speak about our offensive game so much that we forget that we need good defense in business too, that is, effectively protecting the value we create. However, and I speak from experience, the shiny new things seem so much more important than the seemingly dull security and privacy. Well, when looked at from a risk perspective, security and privacy all of a sudden becomes the purview of the manager.
Listen to this podcast (or read the transcript) with Paul Dant about IoT risk assessment as well as security by design, threat modeling and other important topics to the manager ...




Episode 31

Although an integral part of IoT security, IoT privacy doesn’t rely on technology. It relies instead on self-imposed business rules that govern the way the collected data is used within and outside of the enterprise. As with many things tech, government and law is unable to keep up with the innovation of IoT and with what some call its digital exhaust.
Listen to this podcast (or read the transcript) with privacy expert Dale Smith about the top 5 best practices in handling personally identifiable information (PII) and other IoT privacy issues ...




Episode 30

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part two of a two part interview ...




Episode 29

It’s difficult enough to manage network security or web security or application security or mobile security but when they all come together you have the Frankenstein-like monster called IoT security. And when they all come together you have the unique challenges of security system security too – welcome to IoT.
Listen to this podcast (or read the transcript) with Daniel Miessler about the top security risks facing IoT and how to mitigate them. This is part one of a two part interview ...


Getting your arms around the IoT platform is still a challenge, mostly because the definition is still evolving. However if you squint your eyes a platform is either used for managing devices, managing backhaul communications or developing applications. And it lives in the cloud or on-prem or in both places at the same time. Using scope and topology is the first step in narrowing down the field while shopping for your platform.
Watch this video (or read the transcript) to see Ken Forster expertly classify IoT platforms in terms of scope and topology and describe what he considers most important when making a buying decision ...




Episode 28

Big Data is big! It’s another entire industry that’s subsumed by the Internet of Things. There’s a lot to consider but it all starts with your business information requirements – what you get by transforming the raw sensor data you collect into business value you can use.
Listen to this podcast (or read the transcript) with Big Data expert Mark van Rijmenam to conclude our seven-part miniseries on analytics by covering the entire array of what’s available ...