How to speed up IoT deployment: Give each device an identity

Most enterprises are in the process of evaluating how the Internet of Things (IoT) will affect their organization, especially how devices targeted at the Enterprise of Things (EoT) will be deployed. Indeed, companies that deploy “things” need to worry about security, manageability, longevity/availability and robustness — unlike consumers who generally don’t concern themselves with such things.[…]

What is a firewall?

Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. Research firm IDC estimates the firewall and related unified threat management market was a[…]

IDG Contributor Network: How smart cities can protect against IoT security threats

Smart cities, which were once confined to the realms of science fiction books, are rapidly becoming a reality all around the globe. Unfortunately, like all revolutionizing innovations, smart cities are developing their own unique challenges alongside of their perks. So what are industry insiders and tomorrow’s city planners doing to face these challenges? The security[…]

Oracle leverages machine learning to manage, secure enterprise systems

Oracle is not the first company that comes to mind when you think of enterprise security, but the company announced at its recent OpenWorld conference new products with artificial intelligence (AI) and machine learning capabilities to quickly identify security threats. The company introduced two new sets of integrated suites called Oracle Identity Security Operations Center[…]

IoT can learn from smart-phone security

The massive growth of Internet of Things (IoT) devices over the next one to three years should give us pause. As companies rush to get to market first, are we seeing a “dumbing down” of basic device principals that we have been working with for years, particularly enhanced security and privacy. With so many distinct[…]