3 ways we can boost IoT security

BODIL JOSEFSSON | January 9, 2019

article image
It’s a vast opportunity but it also brings vast risk. How do you keep billions of devices secure?  How about the networks they run on? How do you make sure the data you get from all those devices isn’t compromised? There is no one-size-fits-all solution, but let’s look at three pillars of the new and comprehensive security approach necessary to make the IoT safe for business:  Your smartphone is a trusted connected device. For example, it is generally the only device allowed easily on corporate networks, and 90 percent of Swedes between the age of 20-40 use a mobile-phone-based digital national identity system launched just seven years ago. The GSMA has also launched Mobile Connect, a global standard in digital authentication connected to a user’s mobile phone. We need to move this level of security into the IoT. But connecting IoT devices is different from connecting people and their smartphones. First, the IoT encompasses a huge range of devices An IoT device can’t enter a password to gain access, for instance. And while the systems that run our computers and phones are regularly updated, many IoT devices have extremely limited capabilities, cannot have any downtime and will go years between updates.

Spotlight

Nitor Infotech

Nitor has outsourced software product development DNA and specializes in IT engineering management practices – Software Product Engineering, Analytic Engineering, Business Quality Assurance (Testing) and Enterprise Mobility. Our track record boasts of creating world class software products and services with cutting edge technologies across multiple domains.

OTHER ARTICLES

Graph machine learning in distributed systems: What you need to know

Article | March 16, 2020

Just as graphs make it easier for us to understand and act on complex data, graph machine learning can take graph theory a giant step further. But can it even help today’s service providers to improve reliability and predict anomalous behaviors in complicated distributed systems? Find out below…How much do you know about graph representation of data? Over the last two decades, graph theory has become increasingly popular in both research and industry. Among other areas, it has been used in epidemiology, medicine genetics, healthcare, banking and engineering to solve challenges such as routing, finding relation, path etc.

Read More

Why IBM Power Systems means business for SAP

Article | February 20, 2020

As SAP customers consider the hybrid cloud model for their mission-critical applications, they need flexibility and choice in deployments. IBM Power Systems is known for its flexibility, powered by the largest SAP HANA virtualized server scalability[1]. Today, we are further extending this flexibility with the announcement of SAP HANA Enterprise Cloud on IBM Power Systems. To enable this, SAP will place IBM POWER9 servers in SAP HANA Enterprise Cloud (SAP HEC) data centers to give their clients the ability to run their workloads wherever they want across the private or hybrid cloud model. The availability of IBM Power Systems in a SAP HANA Enterprise Cloud environment is a great testimony of the value that IBM Power Systems brings to SAP clients on their digital transformation journey.

Read More

Protecting Healthcare Data and Infrastructure

Article | April 2, 2020

The healthcare industry is increasingly targeted by cybercriminals. As digital transformation accelerates and more providers move their internal systems to the cloud, deploy IoT medical devices and host medical records online, they become even more vulnerable. Over the past four years, nearly 1,500 healthcare companies have been hit with ransomware attacks, and the threat is unlikely to go away. Healthcare data is just too valuable a commodity on the black market for cybercriminals to pass up. In 2019, health organizations continued to get hit with data breaches and ransomware attacks, costing the sector an estimated $4 billion.

Read More

Super Blueprints Integrate the 5G Open Source Stack from Core to Door

Article | June 1, 2021

There is an exciting convergence in the networking industry around open source, and the energy is palpable. At LF Networking, we have a unique perspective as the largest open source initiative in the networking space with the broadest set of projects that make up the diverse and evolving open source networking stack. LF Networking provides platforms and building blocks across the networking industry that enable rapid interoperability, deployment, and adoption and is the nexus for 5G innovation and integration. LF Networking has now tapped confluence on industry efforts to structure a new initiative to develop 5G Super Blueprints for the ecosystem. Major integrations between the building blocks are now underway–between ONAP and ORAN, Akraino and Magma, Anuket and Kubernetes, and more.

Read More

Spotlight

Nitor Infotech

Nitor has outsourced software product development DNA and specializes in IT engineering management practices – Software Product Engineering, Analytic Engineering, Business Quality Assurance (Testing) and Enterprise Mobility. Our track record boasts of creating world class software products and services with cutting edge technologies across multiple domains.

Events