The Internet of Things opens up an expansive set of revenue and service opportunities for enterprises, yet for those benefits to be realized, IoT devices and the networks over which they communicate must be robust and secure.
Best practices for securing the networks that support the Internet of Things is the topic of this third . . . → Read More: 3 Options for Securing the IoT Network – Mobile Enterprise Security Series Part 3 – May 2015
While much of the focus given to the Internet of Things lately is centered on connected consumer products, innovation is also happening at a rapid pace in industrial and enterprise applications — including public safety. From police body cameras and license plate readers, to high-tech connected medical equipment in ambulances, to sensors monitoring road . . . → Read More: Why I Sleep Better at Night: IoT in Public Safety – Connected World Magazine – April 2015
In this second installment in our series on securing the Internet of Things, 151 Advisors’ Partner Steve Brumer and I describe the magnitude of the “threat surface” that connecting billions of devices to the Internet creates… and three best practices for securing these endpoints. . . . → Read More: 3 Best Practices for Securing IoT Endpoints – Mobile Enterprise Security Series Part 2 – March 2015
“Not Your Father’s Platform – How to Connect the Internet of Things” was the subject of a joint presentation Laurie Lamberth and Allison Jones, Software Engineer for machineshop.io, gave to the Denver/Boulder chapter of Women Who Code (WWC) on February 3, 2015. WWC is a non-profit organization hosts technical study groups, demos, hackathons and . . . → Read More: Teaching Women Who Code How to Connect the Internet of Things – February 4, 2015
When you’re thinking about security and the Internet of Things, try this thought experiment suggested by Sonotype CEO Josh Corbin:
“For the next 24 hours, every time you see the word ‘software’ substitute ‘vulnerable or hackable’ and every time you see ‘connected’ substitute ‘exposed.’ So if you take a toaster which is perfectly safe . . . → Read More: IoT Security is Not One-Dimensional – Mobile Enterprise Security Series Part 1 – January 2015
2015 stands to be a great year for all of us — I hope — and this outcome seems certain for the developers of several hot new platforms for M2M and the Internet of Things. The four new-school platforms I review in my January/February 2015 column in Connected World Magazine which blur the bright line I drew in my column between device management and application enablement platforms. . . . → Read More: Not Your Father’s Platform: M2M/IoT Platforms Evolve — Connected World Magazine, January 2015
Thanks, Onalytica, for naming me to berth 40 in in your 2014 “M2M Top 100 Influencers” list! Released on December 10, the list names the 100 people and brands that are “driving the conversation” regarding M2M in social media — particularly on Twitter. M2M is a name for the technologies that collectively underly the Internet of Things . . . → Read More: Laurie Lamberth Named #40 M2M Influencer in Onalytics M2M Top 100 – December 10, 2014
Hello and Happy Holidays! I hope you have had as happy and productive 2014 as I have.
2014 has turned out to be a strong year so far, with my 151 Advisors’ consulting practice growing steadily and my personal life transformed by a midsummer move to Colorado. While prompted by business opportunities for my . . . → Read More: Big News from Laurie Lamberth! also 2015 Mobile, Internet of Things & ad:tech Forecast
I get asked about M2M and the Internet of Things (IoT) all the time. Sometimes on the record as an Associate Partner with strategic consultancy 151 Advisors, other times as a Council Member for expert network Gerson Lehrman Group. While the questions I get asked range all over the map, several are quite common — and these form the basis for my December, 2012 Connected World Magazine column “M2M and Internet of Things FAQs.” . . . → Read More: Whaddya Want to Know? M2M & IoT FAQs — Connected World Magazine, December 2014
M2M turns up in the strangest places sometimes… such as RFID tags attached to medical and recreational cannabis plants and products in Colorado. M2M enables the Colorado Department of Revenue to track cannabis products, maintain compliance with regulations, and assess taxes on Colorado’s burgeoning cannabis trade.
This article explores the RFID-reliant compliance system, how . . . → Read More: M2M Goes to Pot in Colorado … for Marijuana Compliance – Connected World Column, Oct/Nov 2014