ietf rfc 2460

New BlackBerry-commissioned research confirms cybersecurity is top concern in corporate IoT deployments

By Sheetal Kumbhar

BlackBerry Limited announced findings from a new global research whitepaper, which surveyed IT decision makers on corporate IoT deployments. Conducted by 451 Research, the whitepaper titled, “Securing the Enterprise of Things: Opportunity for securing IoT with a unified platform emerging as IoT popularity grows,” reveals that huge opportunities are balanced against significant cybersecurity concerns.

“The proliferation of IoT is being led by enterprises, and they continue to require a unified endpoint management strategy that is capable of scaling to handle billions of connected devices,” said Marty Beard, chief operating officer, BlackBerry. “We are focused on securing the EoT because for all its promise, the expanding adoption of connected things means that companies are only as secure as their most vulnerable endpoint.”

Marty Beard

Survey respondents represent a wide range of vertical industries, including financial services, government and healthcare. Below are some key themes from the research:

78% of respondents indicated interest in a solution that allows them to manage all their endpoints in one place.
63% noted that security is the “top” concern regarding digital technologies and processes. However, only a little over one-third (37%) actually have a formal digital transformation strategy in place.
Organisations are least prepared against external threats, with nearly two-thirds (61%) citing hackers and cyberwarfare as top concerns.
39% of respondents from very large organisations (more than 10,000 employees) revealed that a lack of collaboration among internal departments is a potential barrier to unified endpoint management, while 51% of mid-sized organisations felt the same way.

The new whitepaper is available for download.

For more information about BlackBerry’s EOT solutions, please click here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post New BlackBerry-commissioned research confirms cybersecurity is top concern in corporate IoT deployments appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

New BlackBerry-commissioned research confirms cybersecurity is top concern in corporate IoT deployments

By News Aggregator

By Sheetal Kumbhar

BlackBerry Limited announced findings from a new global research whitepaper, which surveyed IT decision makers on corporate IoT deployments. Conducted by 451 Research, the whitepaper titled, “Securing the Enterprise of Things: Opportunity for securing IoT with a unified platform emerging as IoT popularity grows,” reveals that huge opportunities are balanced against significant cybersecurity concerns.

“The proliferation of IoT is being led by enterprises, and they continue to require a unified endpoint management strategy that is capable of scaling to handle billions of connected devices,” said Marty Beard, chief operating officer, BlackBerry. “We are focused on securing the EoT because for all its promise, the expanding adoption of connected things means that companies are only as secure as their most vulnerable endpoint.”

Marty Beard

Survey respondents represent a wide range of vertical industries, including financial services, government and healthcare. Below are some key themes from the research:

78% of respondents indicated interest in a solution that allows them to manage all their endpoints in one place.
63% noted that security is the “top” concern regarding digital technologies and processes. However, only a little over one-third (37%) actually have a formal digital transformation strategy in place.
Organisations are least prepared against external threats, with nearly two-thirds (61%) citing hackers and cyberwarfare as top concerns.
39% of respondents from very large organisations (more than 10,000 employees) revealed that a lack of collaboration among internal departments is a potential barrier to unified endpoint management, while 51% of mid-sized organisations felt the same way.

The new whitepaper is available for download.

For more information about BlackBerry’s EOT solutions, please click here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post New BlackBerry-commissioned research confirms cybersecurity is top concern in corporate IoT deployments appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post New BlackBerry-commissioned research confirms cybersecurity is top concern in corporate IoT deployments appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

The Internet of Things needs edge cloud computing

By IoT Now Magazine

Internet of Things is no longer a trend or a future dystopia; it is happening today, is growing rapidly and will surely revolutionise many industries. As a result, there will soon be too many devices generating too much data for central cloud to operate efficiently. Bandwidth and latency will become bottlenecks for many IoT applications, says Siavash Alamouti, the president and chief executive of mimik technology.

Thankfully, the answer to this challenge is not apocalypse but edge cloud computing. Edge devices are common: personal computers, game consoles, set-top boxes, tablets, smartphones, gateways, or routers are examples of such devices. They can become mini cloud servers, independent of central cloud since most of the time they can process data independently and communicate, share resources and collaborate. Research by IDC estimates, 10% of the data worldwide will be produced by edge devices by 2020 indicating a significant trend at this early stage.

Deploying new infrastructures to cope with the increase in traffic at the data centres is not feasible as IoT requires orders of magnitude more in capacity and much lower latencies than what central cloud computing can deliver. Instead, we can take advantage of the ever-increasing computing capabilities of edge devices and move as much of the central cloud functions as possible back to the edge.

The opportunity is immense as there are billions of potential edge servers today and there will be tens of billions more tomorrow. These devices are idle most of the time and, thanks to Moore’s law, computing, storage and memory in edge devices is growing rapidly every year. In the past decade, central cloud computing has been a great source of disruption and its natural evolution is to extend all its capabilities to the edge to cope with the explosive growth of data produced at the edge.

Edge cloud is faster, more efficient, scalable, more private and possibly the only way of addressing challenges with scaling of IoT. Using edge cloud computing, data can be immediately processed and put into action saving bandwidth and reducing latency on the network to cope with the huge number of connected devices. Edge computing also brings other benefits that are vital to the development of Internet of Things: a decrease in power consumption – resulting in smaller IoT devices with longer battery life, a lower total cost of infrastructure, and a lower negative impact on the environment.

It will also contribute to privacy, given that data is processed on-site, not leaving the edge device. The data will remain local and not have to cross regional or national boundaries simplifying national law compliance, or adherence to data privacy requirements of various industry verticals.

There are many potential use cases for the combination of IoT and edge computing: connecting electronic gadgets and appliances directly, enabling self-driving features on cars and trucks, connecting drones for collaboration, turning devices such as mobile phones to sensor hubs used in agriculture and mining to collect and process data and other sectors.

Edge cloud computing is indispensable for the future and will accelerate the […]

The post The Internet of Things needs edge cloud computing appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The Internet of Things needs edge cloud computing

By News Aggregator

By IoT Now Magazine

Internet of Things is no longer a trend or a future dystopia; it is happening today, is growing rapidly and will surely revolutionise many industries. As a result, there will soon be too many devices generating too much data for central cloud to operate efficiently. Bandwidth and latency will become bottlenecks for many IoT applications, says Siavash Alamouti, the president and chief executive of mimik technology.

Thankfully, the answer to this challenge is not apocalypse but edge cloud computing. Edge devices are common: personal computers, game consoles, set-top boxes, tablets, smartphones, gateways, or routers are examples of such devices. They can become mini cloud servers, independent of central cloud since most of the time they can process data independently and communicate, share resources and collaborate. Research by IDC estimates, 10% of the data worldwide will be produced by edge devices by 2020 indicating a significant trend at this early stage.

Deploying new infrastructures to cope with the increase in traffic at the data centres is not feasible as IoT requires orders of magnitude more in capacity and much lower latencies than what central cloud computing can deliver. Instead, we can take advantage of the ever-increasing computing capabilities of edge devices and move as much of the central cloud functions as possible back to the edge.

The opportunity is immense as there are billions of potential edge servers today and there will be tens of billions more tomorrow. These devices are idle most of the time and, thanks to Moore’s law, computing, storage and memory in edge devices is growing rapidly every year. In the past decade, central cloud computing has been a great source of disruption and its natural evolution is to extend all its capabilities to the edge to cope with the explosive growth of data produced at the edge.

Edge cloud is faster, more efficient, scalable, more private and possibly the only way of addressing challenges with scaling of IoT. Using edge cloud computing, data can be immediately processed and put into action saving bandwidth and reducing latency on the network to cope with the huge number of connected devices. Edge computing also brings other benefits that are vital to the development of Internet of Things: a decrease in power consumption – resulting in smaller IoT devices with longer battery life, a lower total cost of infrastructure, and a lower negative impact on the environment.

It will also contribute to privacy, given that data is processed on-site, not leaving the edge device. The data will remain local and not have to cross regional or national boundaries simplifying national law compliance, or adherence to data privacy requirements of various industry verticals.

There are many potential use cases for the combination of IoT and edge computing: connecting electronic gadgets and appliances directly, enabling self-driving features on cars and trucks, connecting drones for collaboration, turning devices such as mobile phones to sensor hubs used in agriculture and mining to collect and process data and other sectors.

Edge cloud computing is indispensable for the future and will accelerate the […]

The post The Internet of Things needs edge cloud computing appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post The Internet of Things needs edge cloud computing appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

ER-Telecom and Bell Mobility join #IPv6 measurements parade

By Mat Ford

It’s great to see major network operators continue to deploy IPv6 and continue to register with World IPv6 Launch to have public acknowledgement of the scale and scope of their efforts. This month’s IPv6 network operator measurements include a couple of new entrants that I’d like to highlight in this short post.

ER-Telecom is a Russian telecommunications holding company providing a wide range of services for individuals and corporations. The company is active mainly in the South and Central regions of European Russia. This month’s IPv6 network operator measurements show ER-Telecom ranked 49th with an IPv6 deployment percentage of 10.34%.

Bell Mobility is a Canadian LTE and HSPA+ based wireless provider which sells wireless services across Canada. Bell Mobility and its affiliates combined have over 8 million subscribers as of the end of Q3 2016, making it Canada’s third largest wireless carrier. This month’s IPv6 network operator measurements show Bell Mobility ranked 73rd with an IPv6 deployment percentage of 17.54%.

You can view the full listing of newly updated IPv6 network operator measurements for this month.

If you’re a network operator deploying IPv6 and would like to join ER-Telecom, Bell Mobility and the other networks that make up the ranks of World IPv6 Launch participants, please register your network for measurement.

Read more here:: www.worldipv6launch.org/feed/

ER-Telecom and Bell Mobility join #IPv6 measurements parade

By News Aggregator

By Mat Ford

It’s great to see major network operators continue to deploy IPv6 and continue to register with World IPv6 Launch to have public acknowledgement of the scale and scope of their efforts. This month’s IPv6 network operator measurements include a couple of new entrants that I’d like to highlight in this short post.

ER-Telecom is a Russian telecommunications holding company providing a wide range of services for individuals and corporations. The company is active mainly in the South and Central regions of European Russia. This month’s IPv6 network operator measurements show ER-Telecom ranked 49th with an IPv6 deployment percentage of 10.34%.

Bell Mobility is a Canadian LTE and HSPA+ based wireless provider which sells wireless services across Canada. Bell Mobility and its affiliates combined have over 8 million subscribers as of the end of Q3 2016, making it Canada’s third largest wireless carrier. This month’s IPv6 network operator measurements show Bell Mobility ranked 73rd with an IPv6 deployment percentage of 17.54%.

You can view the full listing of newly updated IPv6 network operator measurements for this month.

If you’re a network operator deploying IPv6 and would like to join ER-Telecom, Bell Mobility and the other networks that make up the ranks of World IPv6 Launch participants, please register your network for measurement.

Read more here:: www.worldipv6launch.org/feed/

The post ER-Telecom and Bell Mobility join #IPv6 measurements parade appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

How to protect your home: 10 tips to prevent digital hacks on IoT connected homes

By Sheetal Kumbhar

Modern connected homes come with risks – unprotected home Wi-Fi can be hacked into, with some dangerous consequences. It becomes especially dangerous if the home is equipped with many connected IoT (Internet of Things) devices.

Hacking into one would allow criminals to access the whole network, forcing smart devices to behave in any way that they want. Identity theft can also result in a takeover of bank accounts, Social Security numbers and other private, vulnerable information.

Some methods that are usually used to detect and fix network problems can become powerful and easy-to-use hacking devices in the hands of criminals. For example, sniffing is a method that allows to see the data on a user’s network by tricking the network into passing the data to hacker’s computer first.

“New smart devices might actually have more problems than a house computer, which usually undergoes more rigid security control. Manufacturers keep producing various new Internet-connected things, often without taking the time to use the most secure technology,” said Marty P. Kamden, CMO of NordVPN (Virtual Private Network). “Your most vulnerable device could be a video camera or a network-connected printer. That device can compromise all network. Some of the most vulnerable IoTs that can have the most serious consequences if hacked include self-driving cars and medical devices.”

NordVPN provides basic security advice that each home needs to follow in order to protect their network.

Use antivirus software. One of the basic rules is to use a reliable antivirus. Unfortunately, users must do their own research in order to choose the antivirus they trust, since opinions vary among different experts. Not all antivirus software is safe, as shown in the recent case with the Russian Kaspersky Lab antivirus that was used by Russian hackers to obtain NSA files.
Use a firewall. The router must have up to date firewall software to protect from the newest potential hacker-installed malware that could, for instance, be used to steal one’s personal data.
Enable two-factor authentication on your online accounts. Signing up for tw0-factor authentication with online accounts makes it harder for fraudsters to steal one’s identity. And even if it’s not foolproof protection from hackers, having a two-factor authentication is definitely better than signing in without it.
When shopping online, use mobile or e-wallets. E-wallets are said to make online checkouts simpler and more secure. Payment processors, such as Apple Pay, PayPal, Google Wallet and others are already starting to implement this one-click method of payment.
Install a VPN. VPNs are one of essential security mechanisms to protect personal networks from prying eyes., as they encrypt all the data shared between the Internet and VPN server. NordVPN uses advanced encryption protocols, has extensive global coverage and no logs policy.
Change the default login information on the home router. It’s easy to change the default admin name and password – and it would make a hacker’s job much more difficult. After new changes are made, it’s important to log out.
Don’t click on suspicious emails. Emails used for phishing will bear attachments, and they can even seemingly come from […]

The post How to protect your home: 10 tips to prevent digital hacks on IoT connected homes appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

How to protect your home: 10 tips to prevent digital hacks on IoT connected homes

By News Aggregator

By Sheetal Kumbhar

Modern connected homes come with risks – unprotected home Wi-Fi can be hacked into, with some dangerous consequences. It becomes especially dangerous if the home is equipped with many connected IoT (Internet of Things) devices.

Hacking into one would allow criminals to access the whole network, forcing smart devices to behave in any way that they want. Identity theft can also result in a takeover of bank accounts, Social Security numbers and other private, vulnerable information.

Some methods that are usually used to detect and fix network problems can become powerful and easy-to-use hacking devices in the hands of criminals. For example, sniffing is a method that allows to see the data on a user’s network by tricking the network into passing the data to hacker’s computer first.

“New smart devices might actually have more problems than a house computer, which usually undergoes more rigid security control. Manufacturers keep producing various new Internet-connected things, often without taking the time to use the most secure technology,” said Marty P. Kamden, CMO of NordVPN (Virtual Private Network). “Your most vulnerable device could be a video camera or a network-connected printer. That device can compromise all network. Some of the most vulnerable IoTs that can have the most serious consequences if hacked include self-driving cars and medical devices.”

NordVPN provides basic security advice that each home needs to follow in order to protect their network.

Use antivirus software. One of the basic rules is to use a reliable antivirus. Unfortunately, users must do their own research in order to choose the antivirus they trust, since opinions vary among different experts. Not all antivirus software is safe, as shown in the recent case with the Russian Kaspersky Lab antivirus that was used by Russian hackers to obtain NSA files.
Use a firewall. The router must have up to date firewall software to protect from the newest potential hacker-installed malware that could, for instance, be used to steal one’s personal data.
Enable two-factor authentication on your online accounts. Signing up for tw0-factor authentication with online accounts makes it harder for fraudsters to steal one’s identity. And even if it’s not foolproof protection from hackers, having a two-factor authentication is definitely better than signing in without it.
When shopping online, use mobile or e-wallets. E-wallets are said to make online checkouts simpler and more secure. Payment processors, such as Apple Pay, PayPal, Google Wallet and others are already starting to implement this one-click method of payment.
Install a VPN. VPNs are one of essential security mechanisms to protect personal networks from prying eyes., as they encrypt all the data shared between the Internet and VPN server. NordVPN uses advanced encryption protocols, has extensive global coverage and no logs policy.
Change the default login information on the home router. It’s easy to change the default admin name and password – and it would make a hacker’s job much more difficult. After new changes are made, it’s important to log out.
Don’t click on suspicious emails. Emails used for phishing will bear attachments, and they can even seemingly come from […]

The post How to protect your home: 10 tips to prevent digital hacks on IoT connected homes appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post How to protect your home: 10 tips to prevent digital hacks on IoT connected homes appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Renesas Electronics enables long-term support for embedded industrial Linux developers with new RZ/G Linux platform

By News Aggregator

By Sheetal Kumbhar

Renesas Electronics Corporation, a supplier of advanced semiconductor solutions, announced the Renesas RZ/G Linux Platform featuring the industrial-grade Civil Infrastructure Platform (CIP) Super Long-Term Support (SLTS) Linux® kernel, which enables Linux-based embedded systems to be maintained for more than 10 years.

The new Renesas RZ/G Linux Platform provides a verified Linux package with cloud-maintenance and development options that makes it easy for embedded developers to leverage Linux for high-performance industrial equipment.

In addition to supporting super long-term Linux kernel stability, which can potentially reduce maintenance costs by hundreds of thousands of dollars per year – the RZ/G Linux Platform significantly reduces development time and Linux set-up costs for industrial equipment.

“Long-term maintenance and support is essential for the safety, security, and reliability required by embedded systems operating in industrial and infrastructure environments,” said Shigeki Kato, vice president, Office Business Division, Renesas Electronics Corporation.

“With the CIP SLTS kernel, the Renesas RZ/G Linux Platform offers an unprecedented maintenance period, significantly easing the challenge of long-term Linux maintenance and reducing design risks for embedded Linux developers.”

“Renesas has long been an enthusiastic supporter of Linux and open source, providing valuable insights and expertise to the CIP project, such as the development of the new Renesas RZ/G Linux Platform,” said Mike Woster, chief operating officer at The Linux Foundation. “We are excited that this platform will be available to developers worldwide, for further advancements of Linux in industrial applications that require long-term maintenance and high reliability.”

Maintaining Linux in industrial and social infrastructure applications presents unique challenges for equipment manufacturers. These machines typically require support for more than 10 years, whereas the maximum Long-Term Support (LTS) Linux maintenance period only runs approximately two years.

In addition, industrial-grade software requires high reliability, safety and security, and real-time or near real-time performance. To address these challenges, Renesas introduced the CIP SLTS kernel into its verified RZ/G Linux package, extending its leadership with Industrial-grade Linux.

Key features of the RZ/G Linux Platform

Verified Linux package that supports the CIP SLTS kernel

The RZ/G Linux Platform provides a validated Linux package, which allows users to immediately begin development in a stable operating environment. The package incorporates several software components, including the CIP Linux kernel, a board support package (BSP), multimedia functionality (H.264 codec, 3D graphics), graphical user interface (GUI) framework (Qt, HTML 5), and security.

Renesas manages maintenance and version management of the Linux distribution, significantly reducing the cost and user efforts of implementing long-term Linux solutions for industrial applications. Today, BSP package support is available for the RZ/G1M MPU, and Renesas plans to introduce support for additional members of the RZ/G1 MPU Series.

Development tools that improve usability

The RZ/G Linux Platform is designed for new users who are migrating from an RTOS or bare-metal environment, as well as for seasoned embedded Linux users. It provides a cloud development environment within Renesas’ e² studio integrated software development tool. This gives embedded programmers the option to write and compile their code on cloud servers, where the Linux distribution and BSP are actively maintained.

The RZ/G Linux Platform also minimises development iterations […]

The post Renesas Electronics enables long-term support for embedded industrial Linux developers with new RZ/G Linux platform appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Renesas Electronics enables long-term support for embedded industrial Linux developers with new RZ/G Linux platform appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Renesas Electronics enables long-term support for embedded industrial Linux developers with new RZ/G Linux platform

By Sheetal Kumbhar

Renesas Electronics Corporation, a supplier of advanced semiconductor solutions, announced the Renesas RZ/G Linux Platform featuring the industrial-grade Civil Infrastructure Platform (CIP) Super Long-Term Support (SLTS) Linux® kernel, which enables Linux-based embedded systems to be maintained for more than 10 years.

The new Renesas RZ/G Linux Platform provides a verified Linux package with cloud-maintenance and development options that makes it easy for embedded developers to leverage Linux for high-performance industrial equipment.

In addition to supporting super long-term Linux kernel stability, which can potentially reduce maintenance costs by hundreds of thousands of dollars per year – the RZ/G Linux Platform significantly reduces development time and Linux set-up costs for industrial equipment.

“Long-term maintenance and support is essential for the safety, security, and reliability required by embedded systems operating in industrial and infrastructure environments,” said Shigeki Kato, vice president, Office Business Division, Renesas Electronics Corporation.

“With the CIP SLTS kernel, the Renesas RZ/G Linux Platform offers an unprecedented maintenance period, significantly easing the challenge of long-term Linux maintenance and reducing design risks for embedded Linux developers.”

“Renesas has long been an enthusiastic supporter of Linux and open source, providing valuable insights and expertise to the CIP project, such as the development of the new Renesas RZ/G Linux Platform,” said Mike Woster, chief operating officer at The Linux Foundation. “We are excited that this platform will be available to developers worldwide, for further advancements of Linux in industrial applications that require long-term maintenance and high reliability.”

Maintaining Linux in industrial and social infrastructure applications presents unique challenges for equipment manufacturers. These machines typically require support for more than 10 years, whereas the maximum Long-Term Support (LTS) Linux maintenance period only runs approximately two years.

In addition, industrial-grade software requires high reliability, safety and security, and real-time or near real-time performance. To address these challenges, Renesas introduced the CIP SLTS kernel into its verified RZ/G Linux package, extending its leadership with Industrial-grade Linux.

Key features of the RZ/G Linux Platform

Verified Linux package that supports the CIP SLTS kernel

The RZ/G Linux Platform provides a validated Linux package, which allows users to immediately begin development in a stable operating environment. The package incorporates several software components, including the CIP Linux kernel, a board support package (BSP), multimedia functionality (H.264 codec, 3D graphics), graphical user interface (GUI) framework (Qt, HTML 5), and security.

Renesas manages maintenance and version management of the Linux distribution, significantly reducing the cost and user efforts of implementing long-term Linux solutions for industrial applications. Today, BSP package support is available for the RZ/G1M MPU, and Renesas plans to introduce support for additional members of the RZ/G1 MPU Series.

Development tools that improve usability

The RZ/G Linux Platform is designed for new users who are migrating from an RTOS or bare-metal environment, as well as for seasoned embedded Linux users. It provides a cloud development environment within Renesas’ e² studio integrated software development tool. This gives embedded programmers the option to write and compile their code on cloud servers, where the Linux distribution and BSP are actively maintained.

The RZ/G Linux Platform also minimises development iterations […]

The post Renesas Electronics enables long-term support for embedded industrial Linux developers with new RZ/G Linux platform appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/