techquickie

Beesion Releases Next Generation of Low-Code Telecom Commissions…

Software release has functionality to calculate sales commissions for IoT and 5G services, like connected cars.

(PRWeb December 21, 2017)

Read the full story at http://www.prweb.com/releases/2017/12/prweb15035574.htm

Read more here:: www.prweb.com/rss2/technology.xml

Comcast Showcases Redesigned X1 Voice Remote

By Cablefax Staff

Comcast revealed the newly designed voice remote for its X1 platform on Monday. Like its predecessor, which won an Emmy, the remote was designed and developed by Comcast and manufactured by Universal Electronics. Comcast is Universal’s largest customer, accounting for 21% of its net sales ($36.8mln) in 3Q17.

The main hardware change is a relocated microphone button. New functions—available on both the original and new X1 remotes—include the ability to fast forward or rewind by a specific increment of time, music recognition technology, new commands for IoT devices and better AI for Spanish-language searches.

The post Comcast Showcases Redesigned X1 Voice Remote appeared first on Cablefax.

Read more here:: feeds.feedburner.com/cable360/ct/operations?format=xml

Nearly three-quarters of retail orgs lack a breach response plan

By Zenobia Hegde

With more than 174 million Americans shopping over the Thanksgiving holiday weekend, it’s looking to be a busy holiday season for retailers this year. As shoppers continue hunting for the perfect gift over the next couple weeks, it’s important to remember that cyber criminals will likely be on the hunt as well. How prepared are retailers to deal with an attack?

In an effort to answer that question, Tripwire surveyed IT security professionals working in retail organisations about their experiences and attitudes towards factors affecting IT security. The results found that a large majority are not fully prepared for data breaches this holiday season.

Of the respondents, only 28% of respondents said they have a fully tested plan in place in the event of a security breach. 21% said their organisation doesn’t have a plan at all, and the same proportion of respondents said they didn’t have the means to notify customers of a data breach within 72 hours, a requirement specified by the General Data Protection Regulation (GDPR).

“Considering the amount of high-profile data breaches that have occurred recently, plus the continued discussion around GDPR, it is surprising and concerning that many retailers do not have a tested plan in the event of a security breach,” said Tim Erlin, vice president of product management and strategy at Tripwire. “It’s encouraging that most respondents think they can meet the 72-hour notification window as set out in the upcoming GDPR, but if they haven’t tested their plans, I don’t know how confident they should be in that assumption.”

Only a small minority of the retail industry felt fully secure in their incident response capabilities. 23% of respondents said they were “fully prepared” to absorb potential financial penalties. Even fewer professionals (15%) said they were fully prepared to manage customer and press communications following an incident.

Not all the survey’s findings were discouraging, however. The results did provide some hope that the industry is moving in the right direction. More than half of respondents (57%) said that their organisation’s ability to detect and respond to a security breach has improved in the past year and a half. With the holiday season in full swing, organisations should make sure they have proper security safeguards in place.

“It’s really critical that organisations have a good view of what’s on their network at all times, that they harden their systems with secure configuration and vulnerability management, and that they are able to continuously monitor for change and are alerted to any drift outside the established security and compliance policies,” said Erlin.

There are a number of effective and established security control frameworks available to guide organisations, such as the CIS Critical Security Controls. Implementing even the most basic security controls can go a long way in improving an organisation’s security posture.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Nearly three-quarters of retail orgs lack a breach response plan appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

CHTF 2017, Lighting Up the Smart City Dream

By IoT – Internet of Things

The Smart City Exhibition under the umbrella of the China Hi-Tech Fair, being held from November 16 to November 21, 2017, at Shenzhen Convention and Exhibition Center, features Smart City solutions, products, frontier technologies and innovative ideas in the sector. It aims to make news related to the sector available to everyone. The Smart City Pavilion flies the […]

The post CHTF 2017, Lighting Up the Smart City Dream appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

Global study reveals IoT adoption is at 69% despite security concerns

By Zenobia Hegde

Cradlepoint announced the release of a new Cradlepoint Business Intelligence Report, “The State of IoT 2017-2018”, which reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organisations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.

Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.

While cybersecurity remains the top concern (40%), it is a desire for increased physical security that is the top driver for IoT adoption (32%), followed by improved operational processes (23%), reduced operational costs (21%) and simplified management (20%). Approximately 71% of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.

Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57% prefer to manage their own IoT device security.

“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks.

“Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”

“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint.

“The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”

Additional resources can be found here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Global study reveals IoT adoption is at 69% despite security concerns appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Widespread mismanagement of privileged accounts and access revealed in One Identity global survey

By Zenobia Hedge

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that nine in 10 (88%) respondents admit to facing challenges when it comes to managing privileged passwords, and one in five (18%) still use a paper-based logbook to manage privileged accounts.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

Management platforms and tools: In addition to 18% of respondents admitting to using paper-based logs, a surprising 36% are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts — indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility: The majority of IT security professionals (57%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21% of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32% said they cannot consistently identify individuals who perform admin activities.
Password management and change: An overwhelming 86% of organisations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

John Milburn

“When an organisation doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity.

“These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organisations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”

Avoiding primitive management

A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organisations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.

One Identity understands that when it comes to managing and monitoring these privileged accounts, continuously controlling access and governing credentials […]

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Enterprises Warming to IoT According to Everest Group Research

Industrial IoT offers faster return on investment for global service providers striving to meet enterprise demand

(PRWeb August 21, 2017)

Read the full story at http://www.prweb.com/releases/2017/08/prweb14612891.htm

Read more here:: www.prweb.com/rss2/technology.xml

Internet of Banking and Payments

By IoT Now Magazine

Event date: November 21 – 23, 2017 Canary Wharf London, UK PSD2 will fundamentally change the ways in which consumers will pay for items. For banks, it will open the door to a wave of competitors, require a lot of investment and has the potential to reduce revenue streams. However, Open Banking more broadly is […]

The post Internet of Banking and Payments appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

IoT Slam Live 2017

By IoT Now Magazine

Event date: June 21 – 22, 2017 North Carolina, USA The IoT Slam® Live, an IoT Slam® production, is the Internet of Things Community’s fifth international IoT conference and its inaugural live in-person event, covering standards, interoperability, open source, integration, security, infrastructure, business models, research, innovation, best practices, technology, industry implementation and compliance, from a […]

The post IoT Slam Live 2017 appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/