The Internet of Things opens up an expansive set of revenue and service opportunities for enterprises, yet for those benefits to be realized, IoT devices and the networks over which they communicate must be robust and secure.
Best practices for securing the networks that support the Internet of Things is the topic of this third . . . → Read More: 3 Options for Securing the IoT Network – Mobile Enterprise Security Series Part 3 – May 2015
In this second installment in our series on securing the Internet of Things, 151 Advisors’ Partner Steve Brumer and I describe the magnitude of the “threat surface” that connecting billions of devices to the Internet creates… and three best practices for securing these endpoints. . . . → Read More: 3 Best Practices for Securing IoT Endpoints – Mobile Enterprise Security Series Part 2 – March 2015
When you’re thinking about security and the Internet of Things, try this thought experiment suggested by Sonotype CEO Josh Corbin:
“For the next 24 hours, every time you see the word ‘software’ substitute ‘vulnerable or hackable’ and every time you see ‘connected’ substitute ‘exposed.’ So if you take a toaster which is perfectly safe . . . → Read More: IoT Security is Not One-Dimensional – Mobile Enterprise Security Series Part 1 – January 2015
I had the pleasure to meet the editorial staff of Mobile Enterprise Magazine during CTIA Super Mobility Week, and ageed to pen a three-part series on securing the Internet of Things, along with my 151 Advisors’ Partner Steve Brumer.
The three articles will cover securing applications, devices and networks. Watch for them in the . . . → Read More: Securing the Internet of Things: Watch for our Upcoming Series in Mobile Enterprise Magazine