Issue OverviewInformation Security magazine - Special Edition, August 2014
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ignored. The web of interconnected devices promises both enormous benefits to users and serious security threats, due to the sensitive data those devices will share.
In this Insider Edition, InfoSec pros will learn about the risks related to the IoT and what they can do to mitigate them. This means, first, understanding how traditional threats, like DDoS attacks, are altered by the IoT, what all-new challenges the IoT creates and what steps must be taken now to get a viable and effective IoT policy in place. Once that's accomplished, the next step is to determine whose job it is to monitor and enforce that policy.
The new interconnectivity of the IoT promises a golden age of the Internet, but securing enterprise systems cannot be neglected. Access >>>
Premium Content for Free.
Internet of Things (IOT): Seven enterprise risks to consider
by Ajay Kumar, Contributor
The Internet of Things is a growing enterprise threat. Learn about the seven key IoT risks to prepare for before implementing an IoT policy.
- Internet of Things (IOT): Seven enterprise risks to consider by Ajay Kumar, Contributor
Securing the Internet of Things
by Kevin Beaver, Network Security
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
- Securing the Internet of Things by Kevin Beaver, Network Security
Internet of Things security: Who is responsible and how is it done?
by Shamus McGillicuddy
Securing the Internet of Things is almost too big a problem to think about. Who's responsible and how will they do it?
- Internet of Things security: Who is responsible and how is it done? by Shamus McGillicuddy
More Premium Content Accessible For Free
Strategies for a successful data protection program
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
Devices, data and how enterprise mobile management reconciles the two
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
Putting security on auto-pilot: What works, what doesn't
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...