IoT-enabled devices News
October 06, 2017
News roundup: Google researchers find and patch vulnerabilities in the Dnsmasq server that are used widely in routers and IoT devices. Plus, EU-U.S. Privacy Shield challenge and more.
September 14, 2017
A set of eight Bluetooth vulnerabilities, branded together as BlueBorne, affect billions of devices and could be one of the most dangerous issues, according to experts.
August 04, 2017
News roundup: U.S. Senators introduce a bipartisan bill to standardize IoT device security for government vendors. Plus, Anthem suffers another data breach, and more.
July 12, 2017
Ping Identity CEO Andre Durand talks with SearchSecurity about the data-driven move toward contextual authentication and intelligent identity and what this means for enterprises.
IoT-enabled devices Get Started
Bring yourself up to speed with our introductory content
IoT will help energy suppliers meet global energy demands, but the challenge lies in finding connectivity which offers both security and simplicity. Continue Reading
IPv6 deployment is looming, but what does this mean for the security of IoT devices? Expert Fernando Gont explains. Continue Reading
The connected car revolution is unfolding, but it posts significant threats. Portnox's Ofer Amitai explains what's needed to ensure connected car safety. Continue Reading
Evaluate IoT-enabled devices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Future Platforms' Olivier Legris explores the proliferation of the smart speaker market and considers the threats posed by smart speakers of the future. Continue Reading
Amortizing the cost of high-quality AI across devices with centralized processing in hyperscale data centers will make IoT efficient and cost-effective. Continue Reading
Ersin Domangue of ISE dissects the IoT Cybersecurity Improvement Act of 2017, explaining what it is, how it will affect everyone and where it falls short. Continue Reading
Manage IoT-enabled devices
Learn to apply best practices and optimize your operations.
Keeping resource-constrained devices safe isn't an easy task. Chipmakers and cryptography specialists are taking the matter of embedded security for IoT into their own hands. Continue Reading
Sumedha Rubasinghe of WSO2 identifies five key challenges of IoT device management and offers advice on how to overcome them. Continue Reading
With IoT, the days of testing what you build are over. TestPlant's Antony Edwards explains why you need to test everything that you touch. Continue Reading
Problem Solve IoT-enabled devices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Find out why enterprise architects are exploring new strategies that distribute analytics closer to IoT devices. Continue Reading
Using a secured IoT chip, device-makers take a bold step to certify the security of their devices -- and ensure a victory against attackers. Continue Reading
By incorporating IoT-enabled wearable devices into your enterprise deployments, you can harness the full potential of your mobility strategy. Continue Reading