The Internet of Things (IoT) introduces a wealth of value as we look to make our digital lives more automated, streamlined, and easier. Unfortunately, with this value comes risk; risk that manifests itself not just in our personal lives, but in our professional business lives and in the industries and industrial settings that make it all possible. This article will cover the cybersecurity threats posed by data integrity in the era of IoT – particularly as it pertains to enterprise organizations and the industrial sector – and what organizations can do to mitigate the threats.
Ted Harrington recently ran The Boston Marathon – the oldest, most prestigious, arguably most important marathon in the world. According to Ted, it was by far one of the most fulfilling experiences of his entire life. Throughout the course of preparing for, attempting, and executing this feat, he noticed some striking parallels between running and entrepreneurship. This is his story.
Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.
It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.
At the recent Consumer Electronics Show (CES) 2017 in Las Vegas, NV, everything was shiny, new, and exciting - but security certainly took a back seat to the autonomous vehicles ... and everything else connected to the Internet.
We are now in the wake of two of the biggest and most catastrophic Distributed Denial of Service (DDoS) attacks that we have seen yet. As we have observed, the Internet of Things (IoT) are beginning to pose a real threat to our information security.
When lives are on the line when the latest Ransomware message comes in, perhaps we'll wish we looked back over time to predict what could happen in the future.
The 2015 edition of the ISSA International Conference in Chicago brought together some of the top minds in technology and security. The conference team packed the agenda with tremendous content and ran the event flawlessly. Still, two days was not enough (it never is) to cover everything we face in this crazy world of cybersecurity.