Cloud Based Software Aids Risk Management | Safety IoT

Whether your organization is a large global conglomerate or a mid-sized company, mitigating risk associated with EHS and sustainability – while preserving your financial health – is challenging.

When we learned Valvoline, named one of America’s Safest Companies for 2017 by EHS Today, was a customer of ProcessMAP and had deployed several of the company’s cloud-based solutions, we wanted to hear more.

With the goal of using technology to optimize safety performance, Valvoline deployed ProcessMAP’s Incident Management, Audit Management, Permits Management, Activity Management, Event Management and Sustainability Performance Management solutions in its manufacturing and retail locations in 2016. Since then, the company has seen improved safety performance, increased employee engagement and risk reduction as it works toward building a zero-incident workplace.

Source: Cloud Based Software Aids Risk Management | Safety IoT

Share

IoT can learn from smartphone security | Network World

IoT can learn from smartphone security

The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing down” of basic device principals that we have been working with for years, particularly enhanced security and privacy. With so many distinct applications, device scope and diversity represent a unique security challenge that so far has not been met.I estimate that 85 percent or more of current IoT devices deployed in the real world do not have adequate security installed, and it’s likely that the vast majority of those will never be upgraded (or are not even capable of being upgraded). That means not only do current devices being installed pose a risk, but over the next one to two years, the vast majority of devices that will be deployed also pose a risk.

Source: IoT can learn from smartphone security | Network World

Share

Will the Internet of Things rewrite the rules on cyber security? | The Local

There’s been lots of hype about the benefits of the Internet of Things (IoT), but ignoring the risks that come with it could have disastrous consequences.

Not too long ago, the idea of communicating with your kitchen appliances or hopping in a self-driving car may have seemed like science fiction.

But the promise and potential that comes with connecting more gadgets online means that just about anything with an on/off switch can be connected to the internet and a remote controlling device over the same network.

By 2020, more than 50 billion devices are expected to be connected to the internet, meaning our world will become increasingly ‘smart’ as the Internet of Things (IoT) permeates into more parts of more people’s lives.

Source: Will the Internet of Things rewrite the rules on cyber security? | The Local

Share

5 IoT trends that will define 2018 | Network World

5 IoT trends that will define 2018

The Internet of Things (IoT) wasted no time spreading across the world and connecting millions of individuals. In just a few short years, billions of sensors redefined how businesses operated and how people interacted with one another, and that was only the start; one IHS forecast predicts the IoT will grow to reach a staggering 75 billion devices by 2025.

Source: 5 IoT trends that will define 2018 | Network World

Share

Can U.S. lawmakers fix IoT security for good? | Network World

iot internet of things strategy briefcase

While the Internet of Things (IoT) has carved out a comfortable place for itself in today’s society and markets, many still fear that the interconnectivity-driven phenomenon is extraordinarily vulnerable to outside attacks. A number of U.S. Senators believe they may have a solution to the problem, and have put forward the Internet of Things Cybersecurity Improvement Act of 2017.

What are the exact details of the text of the bill, and how does it intend to secure one of the most diverse and unregulated assets of the economy? What potential pitfalls stand in the bills way, and how much of a chance does it have of becoming law? An analysis of the IoT Act reveals that it’s a healthy step in the right direction, but it may not be enough.

Source: Can U.S. lawmakers fix IoT security for good? | Network World

Share

The case for blockchain in healthcare | Digital Journal

Healthcare is data driven and yet the vast volumes of data can overwhelm the system. A leading expert has set out the case for the introduction of blockchains for healthcare, as a means of managing data flows.

Blockchains in healthcare have a potentially wide application, from drug discovery to the development of personalized (or precision) medicine, the latter allowing patients and their medics to develop individualized care. They represent another dimension to disruptive digital health technology.

Source: The case for blockchain in healthcare | Digital Journal

Share

How AI, IoT and Big Data Will Affect the Security Industry | Security Sales & Integration

According to James Barrat, author of “Our Final Invention” and expert on the subject, artificial intelligence (AI) is the last invention the human race would ever need to continue to develop and perform tasks usually requiring human intelligence.In the future — and, to be superior to their ancestors — machines and computer systems will reinvent themselves on their own. It may sound a bit scary, but definitely fascinating too!

Source: How AI, IoT and Big Data Will Affect the Security Industry | Security Sales & Integration

Share

Preventing IoT Hacking – Takeaways from 3 IoT Security White Papers | IoT For All

iot security

IoT security is often perceived as a hotbed of failures. However, extensive progress is being made in the field and a multitude of companies are working to solve the common problems that result in the security failures that are often in the news. Here are just a few examples of the kinds of problems faced in the field of IoT security and the solutions companies have developed to address them.

Source: Preventing IoT Hacking – Takeaways from 3 IoT Security White Papers | IoT For All

Share

Analysing the five major aspects of poor Internet of Things security | IoT Tech News

The security market for the Internet of Things (IoT) will reach $37 billion by 2021, according to the analysts at MarketsandMarkets.com. Because there is growing demand for cyber security, there is a lot of money spent to ensure it.

At the start of 2017, experts predicted that gaping holes in IoT would lead to the destruction of critical infrastructure, the growth of competitive intelligence, and the theft of intellectual property. It was also predicted that an increase in DDoS attacks would paralyze the Dyn DNS system and, with it, many important web domains.

With that in mind, it’s worth looking at five major aspects of the lamentable state of IoT security, stemming from explosive growth, scale, vulnerability, capacity, and availability of devices.

Source: Analysing the five major aspects of poor Internet of Things security | IoT Tech News

Share

Dealing with the endpoint security weaknesses of the Internet of Things | IoT Tech News

From vending machines that can autonomously send in refill orders to standalone surveillance cameras, the IoT is showing dramatic growth, and some authorities expect that by 2025 there may be over 75 billion IoT devices in use worldwide. Unfortunately, this poses a great challenge for endpoint and network security monitoring practices, as the exponential growth of the IoT will also vastly increase the number of possible directions from which a network’s security can be compromised.

Source: Dealing with the endpoint security weaknesses of the Internet of Things | IoT Tech News

Share