IoT connectivity has more questions than answers. Whatever connectivity option your customer chooses, be sure it’s secure. This series of blogs looks at where the IoT security gaps are and provides strategies for closing them. The previous blog focused on securing IoT devices, and this one shines a light on connectivity, looking at the reasons behind the problem and six best practices to help your customers keep their environments secure.

The Compute Card, which will be released in mid-2017, already is in the hands of channel partners, who are using it to power the next generation of Intel-based Internet of Things devices and help businesses more quickly embrace IoT applications.

Making the right hardware choices to future-proof an IoT design used to be a problem, now it’s an opportunity to add revenue streams over time. Solution providers are increasing the value of their offerings by designing IoT devices with features and functionality that can be turned on at a later date.

The secret of the IoT is that it actually relies on "old" technology that may have been available 10, 20, even 30 years ago.

The IoT is rapidly becoming a critical aspect of doing business. An IDC survey notes that 58 percent of companies think IoT is strategic to their business model. In an effort to add more support for IoT, Microsoft has announced IoT Central, a solution it is positioning as “an easier way to create connected products that propel business.”

This year’s Coachella Music Festival hosted a stunning drone light show alongside a star-filled artist lineup. During one evening of the festival, more than 100,000 attendees gazed upward as 300 Intel® Shooting Star™ drones filled the sky. The innovative light show made history as one of the largest audiences to witness a live performance of a drone light show to date, according to Intel. 

IT leaders and business leaders have some serious disconnects about the IoT.

IoT security experts are exploring options to enhance public-key cryptography in an era where quantum computing can soon crack current algorithms. To find the sweet spot that meets the constraints of IoT devices, SecureRF partnered with Andes Technology to bring post-quantum cryptographic capability to small, low-power, low-resource IoT devices and nodes.

Security concerns should not prevent your customers from embarking on their IoT journey. You can help them address potential vulnerabilities and limit risks by understanding the weak spots. This series of blogs looks at where the IoT gaps are and provides strategies, tips and best practices for closing them. Here’s a look at the causes behind security problems and best practices and strategies to help your customers keep their environments secure.

Cyberattacks on the electric grid system continue to increase in frequency and sophistication. As utility companies deploy more IoT technologies, they face new security and compliance challenges. Utilities can thwart attacks with an end-to-end security program that incorporates field devices and sensors, communications networks, data centers and the cloud. 


Latest Videos

Subscribe to Industrial