Quantcast
Channel: IoT – SecurityRoundTable.org
Browsing all 20 articles
Browse latest View live

The Evolving Role of the CISO: From Risk Manager to Business Enabler

One of the first things I do in my role as chief security officer is reach out to the heads of other departments to find out how I can integrate myself into their operations. In one more extreme...

View Article



There’s No Such Thing as an “IoT Strategy”

I recently warned business executives and board members of the three myths of the Internet of Things, why aligning cybersecurity with those myths can be detrimental to your organization, and how to...

View Article

IoT is the Eyes and Hands of the Cloud

Inflection points often become inflection points because of the convergence–sometimes planned, sometimes serendipitous–of multiple factors. It happened with the ascent of air travel, television,...

View Article

Don’t Short-Change IoT Security

When we talk about the Internet of Things, it’s easy to get swept away by the sheer magnitude of the IoT market opportunity. After all, the numbers are enormous. More than 20 billion connected things...

View Article

The 6 D’s of Exponential Growth: How and When Cybersecurity Will Become Abundant

This year, I have been fascinated by two books about the near future and how entrepreneurs should think about market opportunities. “Abundance” by Peter Diamandis and Steven Kotler, and “Exponential...

View Article


3 Cybersecurity IoT Myths

This is not an article about why the Internet of Things is a big business opportunity. You already know that. Nor is it going to be about the fact that IoT initiatives need to account for cybersecurity...

View Article

Trust in Healthcare goes beyond the physical

The concept of zero trust has gained a lot of interest and traction among cybersecurity professionals, and for good reason. As threat vectors expand and the ingenuity of bad actors increases, the...

View Article

6 Degrees of IoT: The Kevin Bacon Theory of Networking

You don’t need to be a student of American cinema to know what the movies “Animal House” and “A Few Good Men” have in common: Kevin Bacon. Most, if not all, of us have heard about the Six Degrees of...

View Article


The Keys to Unlocking the Potential of AI in Health Records

Healthcare is one of the industries that stands at the forefront of reaping dramatic and demonstrable benefits from the increased use of artificial intelligence. AI offers real potential to save lives...

View Article


Want a Secure IoT Experience? Automate, Automate, Automate

OK, let’s get the blah-blah-blah out of the way. IoT is a huge market opportunity. It is transforming how data is created, captured, and harnessed for business advantage. Tens of billions of smart...

View Article

Remember That IoT Is Physical—Not Cyber

Business executives and board members are understandably excited—perhaps even giddy—about the potential for huge business upsides resulting from new Internet of Things (IoT) projects. And why not?...

View Article

Edge Computing Is a Big Deal—Are You Ready for It?

I’m willing to bet my membership in Futurists Anonymous that at least one of your technology executives—CISO, CIO or CTO—has uttered the words “edge computing” in your executive staff meetings or...

View Article

Adopting Private 5G Networks? Now, Think Security.

This is the second article in a two-part series on private mobile networks. Part one is about knowing your acronyms.  The next industrial revolution, aka Industry 4.0, is on the horizon. Enterprises...

View Article


Health Care and IoT Security: Your Devices Need a Physical

A robot performs surgery, operated by a doctor who is miles away; a patient swallows a pill containing a monitor that scans the digestive system; even humble stethoscopes and blood-pressure cuffs...

View Article

Smart Cities Are Exciting—Until There’s a Cybersecurity Snafu

The ideas behind “smart cities” are becoming more relevant as leaders in government and business seek innovative ways to respond to the global COVID-19 pandemic.  A recent article in Wired described...

View Article


From Doorbells and Fish Tanks to Nuclear Reactors: Why Focus on IoT Security

As the world grows ever more connected, all our devices are becoming linked together. The activity tracker on my wrist wirelessly uploads data to my smartphone, which in turn controls entertainment...

View Article

The Myths of IoT Security

Conventional thinking about cybersecurity focuses on a basic concept: lock down every computing device in sight in order to keep out hackers, attackers and thieves. However, in a highly connected...

View Article


The Only Way to Secure the IoT Is Zero Trust

Smart toasters, washing machines that can tell the future, and Siri. The Internet of Things is so much more than simply billions of connected things.  IoT is about critical infrastructure, like traffic...

View Article

How to Not Fail at Digital Transformation

Digital transformation – or what I like to call DX – is a buzzword that we all love to use in our discussions around business outcomes and innovation. But what does it really mean?   Broadly, it’s the...

View Article

How to Secure IoT in Financial Services?

The financial services sector is attractive to cyber thieves for one obvious reason—access to funds and related data—and one less obvious—security vulnerabilities around the Internet of Things. The...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images