Issue OverviewInformation Security magazine - Special Edition, August 2014
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ignored. The web of interconnected devices promises both enormous benefits to users and serious security threats, due to the sensitive data those devices will share.
In this Insider Edition, InfoSec pros will learn about the risks related to the IoT and what they can do to mitigate them. This means, first, understanding how traditional threats, like DDoS attacks, are altered by the IoT, what all-new challenges the IoT creates and what steps must be taken now to get a viable and effective IoT policy in place. Once that's accomplished, the next step is to determine whose job it is to monitor and enforce that policy.
The new interconnectivity of the IoT promises a golden age of the Internet, but securing enterprise systems cannot be neglected. Access >>>
Premium Content for Free.
Internet of Things (IOT): Seven enterprise risks to consider
by Ajay Kumar, Contributor
The Internet of Things is a growing enterprise threat. Learn about the seven key IoT risks to prepare for before implementing an IoT policy.
- Internet of Things (IOT): Seven enterprise risks to consider by Ajay Kumar, Contributor
Securing the Internet of Things
by Kevin Beaver, Network Security
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
- Securing the Internet of Things by Kevin Beaver, Network Security
Internet of Things security: Who is responsible and how is it done?
by Shamus McGillicuddy
Securing the Internet of Things is almost too big a problem to think about. Who's responsible and how will they do it?
- Internet of Things security: Who is responsible and how is it done? by Shamus McGillicuddy
More Premium Content Accessible For Free
Does Windows 8.1 meet the demands of the BYOD age?
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Application security policy after Heartbleed
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
Devising a security strategy for the modern network
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...