techquickie

CHTF 2017, Lighting Up the Smart City Dream

By IoT – Internet of Things

The Smart City Exhibition under the umbrella of the China Hi-Tech Fair, being held from November 16 to November 21, 2017, at Shenzhen Convention and Exhibition Center, features Smart City solutions, products, frontier technologies and innovative ideas in the sector. It aims to make news related to the sector available to everyone. The Smart City Pavilion flies the […]

The post CHTF 2017, Lighting Up the Smart City Dream appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

CHTF 2017, Lighting Up the Smart City Dream

By News Aggregator

By IoT – Internet of Things

The Smart City Exhibition under the umbrella of the China Hi-Tech Fair, being held from November 16 to November 21, 2017, at Shenzhen Convention and Exhibition Center, features Smart City solutions, products, frontier technologies and innovative ideas in the sector. It aims to make news related to the sector available to everyone. The Smart City Pavilion flies the […]

The post CHTF 2017, Lighting Up the Smart City Dream appeared first on IoT – Internet of Things.

Read more here:: iot.do/feed

The post CHTF 2017, Lighting Up the Smart City Dream appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Global study reveals IoT adoption is at 69% despite security concerns

By Zenobia Hegde

Cradlepoint announced the release of a new Cradlepoint Business Intelligence Report, “The State of IoT 2017-2018”, which reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organisations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.

Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.

While cybersecurity remains the top concern (40%), it is a desire for increased physical security that is the top driver for IoT adoption (32%), followed by improved operational processes (23%), reduced operational costs (21%) and simplified management (20%). Approximately 71% of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.

Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57% prefer to manage their own IoT device security.

“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks.

“Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”

“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint.

“The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”

Additional resources can be found here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Global study reveals IoT adoption is at 69% despite security concerns appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Global study reveals IoT adoption is at 69% despite security concerns

By News Aggregator

By Zenobia Hegde

Cradlepoint announced the release of a new Cradlepoint Business Intelligence Report, “The State of IoT 2017-2018”, which reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organisations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.

Conducted by Spiceworks, the study surveyed 400 IT professionals in the U.S., Canada and the UK at companies with at least 500 employees across 22 industries. Respondents are all involved with IoT strategies and decisions at their organisations.

While cybersecurity remains the top concern (40%), it is a desire for increased physical security that is the top driver for IoT adoption (32%), followed by improved operational processes (23%), reduced operational costs (21%) and simplified management (20%). Approximately 71% of respondents who already use IoT technologies say they’re using it for building security, often through security cameras.

Recent botnet attacks have infected millions of IoT devices. However, despite the growing security threat associated with IoT, the research shows that about half of the organisations surveyed are deploying IoT solutions on their existing enterprise network and 57% prefer to manage their own IoT device security.

“Following the spread of IoT botnets like Reaper and Mirai, which infected millions of internet-connected security cameras, routers, and digital video recorders, it’s evident that insecure IoT devices, even connected security devices, are putting organisations more at risk,” said Peter Tsai, senior technology analyst at Spiceworks.

“Before deploying network-connected devices that create more entry points for hackers to exploit, organisations should vet the security of all IoT devices they plan to introduce and ensure their company can adequately protect these devices from potential threats.”

“Our new ‘State of IoT’ report highlights a looming issue within commercial IoT deployments – cross-contamination. Companies that deploy IoT devices on their existing enterprise networks are significantly expanding their attack surface and creating new vulnerabilities to IoT-specific threats that traditional security tools are not equipped to handle,” said Ken Hosac, vice president of IoT business development at Cradlepoint.

“The good news, however, is that companies can leverage software-defined perimeter technology to spin-up virtual overlay networks, without trained specialists, that isolate IoT devices from existing networks—and other IoT devices, control access and shield them from being Internet-addressable.”

Additional resources can be found here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post Global study reveals IoT adoption is at 69% despite security concerns appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Global study reveals IoT adoption is at 69% despite security concerns appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Widespread mismanagement of privileged accounts and access revealed in One Identity global survey

By Zenobia Hedge

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that nine in 10 (88%) respondents admit to facing challenges when it comes to managing privileged passwords, and one in five (18%) still use a paper-based logbook to manage privileged accounts.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

Management platforms and tools: In addition to 18% of respondents admitting to using paper-based logs, a surprising 36% are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts — indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility: The majority of IT security professionals (57%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21% of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32% said they cannot consistently identify individuals who perform admin activities.
Password management and change: An overwhelming 86% of organisations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

John Milburn

“When an organisation doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity.

“These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organisations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”

Avoiding primitive management

A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organisations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.

One Identity understands that when it comes to managing and monitoring these privileged accounts, continuously controlling access and governing credentials […]

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

Widespread mismanagement of privileged accounts and access revealed in One Identity global survey

By News Aggregator

By Zenobia Hedge

One Identity, a proven leader in helping organisations get identity and access management (IAM) right, released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening research findings are that nine in 10 (88%) respondents admit to facing challenges when it comes to managing privileged passwords, and one in five (18%) still use a paper-based logbook to manage privileged accounts.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

Management platforms and tools: In addition to 18% of respondents admitting to using paper-based logs, a surprising 36% are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts — indicating widespread inconsistency in privileged access management (PAM).
Monitoring and visibility: The majority of IT security professionals (57%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 21% of respondents confessed they are unable to monitor or record activity performed with admin credentials, while 32% said they cannot consistently identify individuals who perform admin activities.
Password management and change: An overwhelming 86% of organisations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

John Milburn

“When an organisation doesn’t implement the very basic processes for security and management around privileged accounts, they are exposing themselves to significant risk. Over and over again, breaches from hacked privileged accounts have resulted in astronomical mitigation costs, as well as data theft and tarnished brands,” said John Milburn, president and general manager of One Identity.

“These survey results indicate that there are an alarmingly high percentage of companies that don’t have proper procedures in place. It is crucial for organisations to implement best practices regarding privileged access management without creating new roadblocks for work to get done.”

Avoiding primitive management

A recent Forrester Report states that eight out of 10 breaches that occur involve privileged credentials, highlighting just how much of a target privileged accounts are for hackers. Cybercriminals know that gaining access to privileged accounts is the easiest and fastest way to obtain a company’s critical data and systems, which is why organisations can no longer rely on old practices, such as paper records or Excel logbooks, to manage these priority accounts.

One Identity understands that when it comes to managing and monitoring these privileged accounts, continuously controlling access and governing credentials […]

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Widespread mismanagement of privileged accounts and access revealed in One Identity global survey appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

ETSI creates City Digital Profile group on smart cities

By News Aggregator

By Zenobia Hedge

ETSI is pleased to announce the creation of a new Industry Specification Group “City Digital Profile” (ISG CDP) that will help accelerate the delivery of integrated citizen services and provide a technology road map for city leaders who will benefit from standardised solutions from their suppliers.

In providing this technology framework and clear roadmap for technology investment and deployment, market confidence levels in the city infrastructure investments should increase and in addition this will cities the possibility to replicate those solutions across domains, between cities and on a large scale. Smart services are intended to improve the overall quality of living in the city and make them attractive to citizens, investors, business, innovators, visitors and tourists.

The City Digital Profile ISG will enable cities to procure smart solutions with confidence that those solutions will be extendable, configurable and interoperable with similar services from other cities and providers. City administrators will therefore deliver advanced services to their citizens, whilst respecting essential environmental factors, sustainability objectives and reducing the overall cost of deployment.

“I am excited that this group will enable city leaders and suppliers to work together to mass market replication of citizen centric systems that are innovative, agile and creative while also fully standards compliant, secure, resilient and cost effective,” says Paul Copping, convenor of the City Digital Profile ISG, and chief innovation officer at DG Cities Ltd in Greenwich, London.

Initial cross domain city applications will include:

Health and social care (disability entitlement; housing benefit and rent payment; housing condition, assisted living and vulnerability)
Building management and connected homes
Urban lighting
Water and waste management and energy
Transportation and mobility
Environmental issues such as pollution and resource optimisation

Other key issues such as citizen related data retention and privacy protection will also be considered, in co-operation with such groups as oneM2M, the ETSI founded partnership project and the ETSI Technical Committee Cyber.

The kick-off meeting of the ISG will take place on 20-21 November 2017 at ETSI headquarters where the group will elect its chair and vice chair and decide on the future work and priorities.

ETSI will also be a speaker at the Smart City Expo, in Barcelona from 14-16 November in Barcelona, as well as organising a dedicated session alongside the main event to present the ISG CDP concept.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

The post ETSI creates City Digital Profile group on smart cities appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post ETSI creates City Digital Profile group on smart cities appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Dataiku and Keyrus UK partner to build better artificial intelligence for companies

By News Aggregator

By Sheetal Kumbhar

Dataiku, the maker of the enterprise data science software platform Dataiku Data Science Studio (DSS), has announced a partnership in the UK with Keyrus, one of the world’s leading data consultancies.

The two companies have already engaged in successful partnerships in France and the US and have now agreed to partner in the UK to streamline the process of building data applications for some of the largest companies in the country.

As more and more data is being produced in almost every aspect of business, from online customer interactions to IoT data from industrial machinery, there is an opportunity for companies to generate meaningful insight from this data using the latest technologies in machine learning, AI and data science.

As a result, the leading and most competitive companies, across every industry, are the ones who take advantage of this data to create powerful analytics applications that make business decisions based upon data.

Keyrus, a global organisation with 2700 employees and offices in 17 countries, is one of the world’s leading data consultancies, providing custom solutions that enable companies to unlock powerful insights about their products, customers, and business processes. They provide cutting edge data science expertise to some of the largest companies in the world, including L’Oréal, ABInBev, GMF, AXA, BNP Paribas, Carrefour, AT&T, Orange and Disneyland.

Santiago Castro

To better serve their UK customers and efficiently and effectively build data products with the most recent, cutting-edge technologies, they have announced a partnership in the UK with enterprise data science software maker and UK Enterprise startup of the year, Dataiku. A company that also just announced a new 21.5 million pound Series B fundraising round to grow their global operations and expand heavily in the UK.

“As a result of this partnership our clients can now benefit from a unique joint value proposition” said Santiago Castro, head of Strategy at Keyrus UK. “Joining Keyrus Management Transformation offering with DSS platform will help customers accelerate their digital transformation by democratising AI for the citizens, while facilitating collaboration of various communities of Data Scientists, business analysts and IT who can jointly work, innovate, share understandings and insights in a common platform”.

The two companies have already successfully partnered in France and the United States to streamline the process of building data science applications for some of the largest companies in those markets.

“We are very excited to announce this partnership with Keyrus UK and help them provide data innovation to their customers in the UK,” said Jennifer Roubaud, VP of UK and Ireland with head UK of Dataiku. “This synergy aligns perfectly with our goals of partnering with leading innovators in the UK to build strong relationships and powerful products that help companies become data driven. We are excited to work with them and contribute to the local community of innovation and continue providing incredible solutions to our customers.”

Jennifer Roubaud

Dataiku is the maker of the all-in-one enterprise platform, Dataiku Data Science Studio (DSS), an advanced analytics software solution that enables companies to build and deliver data products more efficiently. […]

The post Dataiku and Keyrus UK partner to build better artificial intelligence for companies appeared first on IoT Now – How to run an IoT enabled business.

Read more here:: www.m2mnow.biz/feed/

The post Dataiku and Keyrus UK partner to build better artificial intelligence for companies appeared on IPv6.net.

Read more here:: IPv6 News Aggregator

Brambles puts more money behind IoT venture

Data-driven supply chain work gets $21.4m.

Read more here:: www.itnews.com.au/RSS/rss.ashx?type=Category&ID=406

Brambles puts more money behind IoT venture

By News Aggregator

Data-driven supply chain work gets $21.4m.

Read more here:: www.itnews.com.au/RSS/rss.ashx?type=Category&ID=406

The post Brambles puts more money behind IoT venture appeared on IPv6.net.

Read more here:: IPv6 News Aggregator