Internet of things security
Internet of things security includes comprehensive resources about identity and access management for IoT, attack vectors and mitigations, intellectual property protection and threat prevention and defense.
Top Stories
-
Tip
30 Jul 2025
Explore the relationship between IoT governance and privacy
Emerging industry standards and regulations -- coupled with technologies like AI -- will underscore the importance of IoT governance and privacy in the years to come. Continue Reading
By- Dr. Diane Groth, Laetare Cybersecurity LLC
-
Tip
25 Jul 2025
11 IoT security challenges and how to overcome them
While influential and beneficial, IoT introduces several security challenges, from device discovery and patching to access control and cyberattacks. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
20 Sep 2019
Create a manageable, secure IT/OT convergence strategy in 3 steps
An effective IT/OT strategy requires at least three things: an evangelist, an infrastructure reference architecture and a plan to sanely divide operations between IT and OT. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
20 Sep 2019
Tips and tricks to integrate IT and OT teams securely
IT and operational teams can work in tandem to support IoT projects, but their separate roles and responsibilities to one another must be clearly defined. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
20 Sep 2019
What's the role of people in IT/OT security?
To enable a smoother, more secure IT/OT convergence, get wise to the potential conflicts between IT and OT historical priorities and traditional work cultures. Continue Reading
By- Jessica Groopman, Kaleido Insights
-
Infographic
01 Aug 2019
IoT cybersecurity: Do third parties leave you exposed?
IoT's vast vendor landscape drives innovation, but working with so many third parties also comes with baggage in the form of third-party cybersecurity issues. Continue Reading
-
Definition
30 Jul 2019
embedded system security
Embedded system security is a strategic approach to protecting software running on embedded systems from attack. An embedded system is a programmable hardware component with a minimal operating system and software. Continue Reading
-
Feature
29 May 2019
Human rights advocate talks GDPR, AI and data privacy laws
Human rights advocate Bjørn Stormorken talks about the importance of data privacy laws, and why stronger laws and more data literacy are necessary today. Continue Reading
By -
Blog Post
07 May 2019
Why are connected devices leaving UK businesses as vulnerable as ever in 2019?
Collective consciousness about IoT risks and the consequences of IoT security breaches is growing, but still many organizations remain susceptible to attack. Forescout's Myles Bray discusses the ... Continue Reading
By- Myles Bray, ForeScout
-
Blog Post
25 Feb 2019
Overcome the cybersecurity skills gap to embrace the digital transformation power of IoT
Securing IoT is critical, but with a major security skills shortage, recruiting talent is challenging to say the least. Fortinet's Jonathan Nguyen-Duy offers insight into finding – or cultivating – ... Continue Reading
By- Jonathan Nguyen-Duy, Fortinet
-
Blog Post
20 Feb 2019
Strong security can unleash the promise of the industrial internet of things
Industrial IoT is set to make a worldwide economic impact. However, without strong security, IIoT efforts are for naught. DigiCert's Dan Timpson explains why PKI and digital certificates are key to ... Continue Reading
By- Dan Timpson, DigiCert
-
Blog Post
13 Sep 2018
Blockchain offers a new approach to customer satisfaction with the help of IoT
Pairing blockchain with IoT is revolutionizing the customer experience, says Voxpro's Brian Hannon, namely by providing the trust needed to build customer relationships on core values of security, ... Continue Reading
By- Brian Hannon, Voxpro - powered by TELUS International
-
News
11 Jul 2018
Execs: Content management in the cloud not as easy as it looks
Challenges await companies as they move content and microservices app-enabled processes to the cloud. Chief among them are data security and apprehension about process complexity. Continue Reading
By- Don Fluckinger, Senior News Writer
-
News
29 Jun 2018
GlobalSign, Comodo launch competing IoT security platforms
Rival certificate authorities GlobalSign and Comodo CA have strengthened their presence in the IoT security market with new platforms for connected devices. Continue Reading
By- Rob Wright, Senior News Director, Dark Reading
-
Feature
01 Jun 2018
Stranger things: IoT security concerns extend CISOs' reach
The internet of things has drastically expanded the scope of what enterprises need to protect, adding challenges big and small to CISOs' responsibilities. Continue Reading
-
Blog Post
23 Apr 2018
Ethics, values and common standards are essential for shaping an IoT-smart society
Industry leaders and policymakers must ensure the well-being of the consumer in a smart, connected world. Wipro's Jayraj Nair explains why ethics, values and common standards are critical. Continue Reading
By- Jayraj Nair, Wipro
-
Opinion
22 Feb 2018
What's our future if we don't secure IoT devices?
When everything from the coffee maker to the manufacturing plant's robots to the electric grid is connected, shouldn't security be IT's primary concern? Continue Reading
By- Mike Matchett, Small World Big Data
-
Blog Post
08 Feb 2018
Dawning of the digital security border: A new standard for wide area perimeter and border security
Technology-based perimeter security may have a potential use case in the U.S. again thanks to low-power sensors and the new 802.16s industrial wireless standard. Continue Reading
By- Stewart Kantor, Ondas Networks Inc.
-
Blog Post
02 Feb 2018
The role retailers should play in driving IoT security certification standards
IoT security is a major concern, especially for retailers. JASK's Greg Martin explores the role retailers have to play in securing IoT and keeping themselves and consumers safe. Continue Reading
By- Greg Martin, JASK
-
Blog Post
30 Jan 2018
Predictions: Learning from the past as we advance IoT security in 2018 and beyond
Myles Bray of ForeScout compiled IoT security predictions from Ayelet Kutner, Jon Connet and Bob Reny, revealing what security threats organizations may see over the next year. Continue Reading
By- Myles Bray, ForeScout
-
Definition
15 Dec 2014
machine authentication
Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human. Continue Reading