ipv6 info

CHTF 2017, Lighting Up the Smart City Dream

By IoT – Internet of Things

The Smart City Exhibition under the umbrella of the China Hi-Tech Fair, being held from November 16 to November 21, 2017, at Shenzhen Convention and Exhibition Center, features Smart City solutions, products, frontier technologies and innovative ideas in the sector. It aims to make news related to the sector available to everyone. The Smart City Pavilion flies the […]

The post CHTF 2017, Lighting Up the Smart City Dream appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

CHTF 2017, Lighting Up the Smart City Dream

By News Aggregator

By IoT – Internet of Things

The Smart City Exhibition under the umbrella of the China Hi-Tech Fair, being held from November 16 to November 21, 2017, at Shenzhen Convention and Exhibition Center, features Smart City solutions, products, frontier technologies and innovative ideas in the sector. It aims to make news related to the sector available to everyone. The Smart City Pavilion flies the […]

The post CHTF 2017, Lighting Up the Smart City Dream appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

The post CHTF 2017, Lighting Up the Smart City Dream appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Launch of £5 million UK hardware security Institute at Queen’s University Belfast

By Zenobia Hegde

What:

A £5 million (€5.62 million) multi-university Research Institute to improve hardware security and reduce vulnerability to cyber threats will be launched at the Centre for Secure Information Technologies, Queen’s University.
Where:

Centre for Secure Information Technologies,
ECIT,

Queen’s University Belfast,
Northern Ireland Science Park,
Queen’s Road,
Queen’s Island,
Belfast,
BT3 9DT

When:

Wednesday 22 November
Key media opportunity 11am – 11.30am
Event runs from 9am – 3pm (full itinerary attached)

Media opportunities:

Media are welcome to attend the full event but there will be a key media opportunity between 11am – 11.30am.

From 11am – 11.10am there will be a photo opportunity and from 11.10am there will be media interviews with professor Máire O’Neill and Dr Mathias Wagner, chief security technologist, NXP.

Bids should be forwarded to Emma Gallagher in the Communications Office by Tuesday 21 November.

Attachments:

Event itinerary

Media inquiries to Emma Gallagher at Queen’s Communications Office on Tel: (028) 9097 5384 or email emma.gallagher@qub.ac.uk

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Launch of £5 million UK hardware security Institute at Queen’s University Belfast appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Launch of £5 million UK hardware security Institute at Queen’s University Belfast

By News Aggregator

By Zenobia Hegde

What:

A £5 million (€5.62 million) multi-university Research Institute to improve hardware security and reduce vulnerability to cyber threats will be launched at the Centre for Secure Information Technologies, Queen’s University.
Where:

Centre for Secure Information Technologies,
ECIT,

Queen’s University Belfast,
Northern Ireland Science Park,
Queen’s Road,
Queen’s Island,
Belfast,
BT3 9DT

When:

Wednesday 22 November
Key media opportunity 11am – 11.30am
Event runs from 9am – 3pm (full itinerary attached)

Media opportunities:

Media are welcome to attend the full event but there will be a key media opportunity between 11am – 11.30am.

From 11am – 11.10am there will be a photo opportunity and from 11.10am there will be media interviews with professor Máire O’Neill and Dr Mathias Wagner, chief security technologist, NXP.

Bids should be forwarded to Emma Gallagher in the Communications Office by Tuesday 21 November.

Attachments:

Event itinerary

Media inquiries to Emma Gallagher at Queen’s Communications Office on Tel: (028) 9097 5384 or email emma.gallagher@qub.ac.uk

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Launch of £5 million UK hardware security Institute at Queen’s University Belfast appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Launch of £5 million UK hardware security Institute at Queen’s University Belfast appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Global study reveals IoT adoption is at 69% despite security concerns

By Zenobia Hegde

Cradlepoint announced the release of a new Cradlepoint Business Intelligence Report, “The State of IoT 2017-2018”, which reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organisations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.

Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.

While cybersecurity remains the top concern (40%), it is a desire for increased physical security that is the top driver for IoT adoption (32%), followed by improved operational processes (23%), reduced operational costs (21%) and simplified management (20%). Approximately 71% of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.

Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57% prefer to manage their own IoT device security.

“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks.

“Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”

“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint.

“The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”

Additional resources can be found here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Global study reveals IoT adoption is at 69% despite security concerns appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Global study reveals IoT adoption is at 69% despite security concerns

By News Aggregator

By Zenobia Hegde

Cradlepoint announced the release of a new Cradlepoint Business Intelligence Report, “The State of IoT 2017-2018”, which reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organisations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.

Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.

While cybersecurity remains the top concern (40%), it is a desire for increased physical security that is the top driver for IoT adoption (32%), followed by improved operational processes (23%), reduced operational costs (21%) and simplified management (20%). Approximately 71% of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.

Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57% prefer to manage their own IoT device security.

“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks.

“Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”

“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint.

“The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”

Additional resources can be found here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Global study reveals IoT adoption is at 69% despite security concerns appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Global study reveals IoT adoption is at 69% despite security concerns appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Widespread mismanagement of privileged accounts and access revealed in One Identity global survey

By Zenobia Hedge

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that nine in 10 (88%) respondents admit to facing challenges when it comes to managing privileged passwords, and one in five (18%) still use a paper-based logbook to manage privileged accounts.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

Management platforms and tools: In addition to 18% of respondents admitting to using paper-based logs, a surprising 36% are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts — indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility: The majority of IT security professionals (57%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21% of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32% said they cannot consistently identify individuals who perform admin activities.
Password management and change: An overwhelming 86% of organisations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

John Milburn

“When an organisation doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity.

“These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organisations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”

Avoiding primitive management

A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organisations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.

One Identity understands that when it comes to managing and monitoring these privileged accounts, continuously controlling access and governing credentials […]

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Widespread mismanagement of privileged accounts and access revealed in One Identity global survey

By News Aggregator

By Zenobia Hedge

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that nine in 10 (88%) respondents admit to facing challenges when it comes to managing privileged passwords, and one in five (18%) still use a paper-based logbook to manage privileged accounts.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

Management platforms and tools: In addition to 18% of respondents admitting to using paper-based logs, a surprising 36% are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts — indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility: The majority of IT security professionals (57%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21% of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32% said they cannot consistently identify individuals who perform admin activities.
Password management and change: An overwhelming 86% of organisations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

John Milburn

“When an organisation doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity.

“These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organisations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”

Avoiding primitive management

A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organisations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.

One Identity understands that when it comes to managing and monitoring these privileged accounts, continuously controlling access and governing credentials […]

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

ETSI creates City Digital Profile group on smart cities

By Zenobia Hedge

ETSI is pleased to announce the creation of a new Industry Specification Group “City Digital Profile” (ISG CDP) that will help accelerate the delivery of integrated citizen services and provide a technology road map for city leaders who will benefit from standardised solutions from their suppliers.

In providing this technology framework and clear roadmap for technology investment and deployment, market confidence levels in the city infrastructure investments should increase and in addition this will cities the possibility to replicate those solutions across domains, between cities and on a large scale. Smart services are intended to improve the overall quality of living in the city and make them attractive to citizens, investors, business, innovators, visitors and tourists.

The City Digital Profile ISG will enable cities to procure smart solutions with confidence that those solutions will be extendable, configurable and interoperable with similar services from other cities and providers. City administrators will therefore deliver advanced services to their citizens, whilst respecting essential environmental factors, sustainability objectives and reducing the overall cost of deployment.

“I am excited that this group will enable city leaders and suppliers to work together to mass market replication of citizen centric systems that are innovative, agile and creative while also fully standards compliant, secure, resilient and cost effective,” says Paul Copping, convenor of the City Digital Profile ISG, and chief innovation officer at DG Cities Ltd in Greenwich, London.

Initial cross domain city applications will include:

Health and social care (disability entitlement; housing benefit and rent payment; housing condition, assisted living and vulnerability)
Building management and connected homes
Urban lighting
Water and waste management and energy
Transportation and mobility
Environmental issues such as pollution and resource optimisation

Other key issues such as citizen related data retention and privacy protection will also be considered, in co-operation with such groups as oneM2M, the ETSI founded partnership project and the ETSI Technical Committee Cyber.

The kick-off meeting of the ISG will take place on 20-21 November 2017 at ETSI headquarters where the group will elect its chair and vice chair and decide on the future work and priorities.

ETSI will also be a speaker at the Smart City Expo, in Barcelona from 14-16 November in Barcelona, as well as organising a dedicated session alongside the main event to present the ISG CDP concept.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post ETSI creates City Digital Profile group on smart cities appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

ETSI creates City Digital Profile group on smart cities

By News Aggregator

By Zenobia Hedge

ETSI is pleased to announce the creation of a new Industry Specification Group “City Digital Profile” (ISG CDP) that will help accelerate the delivery of integrated citizen services and provide a technology road map for city leaders who will benefit from standardised solutions from their suppliers.

In providing this technology framework and clear roadmap for technology investment and deployment, market confidence levels in the city infrastructure investments should increase and in addition this will cities the possibility to replicate those solutions across domains, between cities and on a large scale. Smart services are intended to improve the overall quality of living in the city and make them attractive to citizens, investors, business, innovators, visitors and tourists.

The City Digital Profile ISG will enable cities to procure smart solutions with confidence that those solutions will be extendable, configurable and interoperable with similar services from other cities and providers. City administrators will therefore deliver advanced services to their citizens, whilst respecting essential environmental factors, sustainability objectives and reducing the overall cost of deployment.

“I am excited that this group will enable city leaders and suppliers to work together to mass market replication of citizen centric systems that are innovative, agile and creative while also fully standards compliant, secure, resilient and cost effective,” says Paul Copping, convenor of the City Digital Profile ISG, and chief innovation officer at DG Cities Ltd in Greenwich, London.

Initial cross domain city applications will include:

Health and social care (disability entitlement; housing benefit and rent payment; housing condition, assisted living and vulnerability)
Building management and connected homes
Urban lighting
Water and waste management and energy
Transportation and mobility
Environmental issues such as pollution and resource optimisation

Other key issues such as citizen related data retention and privacy protection will also be considered, in co-operation with such groups as oneM2M, the ETSI founded partnership project and the ETSI Technical Committee Cyber.

The kick-off meeting of the ISG will take place on 20-21 November 2017 at ETSI headquarters where the group will elect its chair and vice chair and decide on the future work and priorities.

ETSI will also be a speaker at the Smart City Expo, in Barcelona from 14-16 November in Barcelona, as well as organising a dedicated session alongside the main event to present the ISG CDP concept.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post ETSI creates City Digital Profile group on smart cities appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post ETSI creates City Digital Profile group on smart cities appeared on IPv6.net.

Read more here:: IPv6 News Aggregator