Contributors   |   Messages   |   Polls   |   Resources   |  
Comments
Newest First | Oldest First | Threaded View
Page 1 / 2   >   >>
batye
batye
3/6/2016 6:55:55 PM
User Rank
Platinum
Re: business iot
@clrmoney yes you are right, but aren't we all :) now...???

50%
50%
batye
batye
3/6/2016 6:54:30 PM
User Rank
Platinum
Re: business iot
@freehe  thanks for the link interesting to know...

50%
50%
batye
batye
3/6/2016 6:53:46 PM
User Rank
Platinum
Re: IoT security security security...
@mhhf1ve  it like never ending game catch 22 where bad guys always ahead of the game...

50%
50%
freehe
freehe
2/27/2016 3:12:33 PM
User Rank
Platinum
Re: business iot
The digital revolution can provide many benefits for businesses such as: increased sales, increased customer satisfaction, provide better data for better business decisions and provide real-time data.

With the new election approaching it definitely benefits the presidential election and campaign process but automating voting processes and analyzing data.

Here is a great infographic on the digital revolution

https://www.linkedin.com/pulse/20130507113920-1816165-the-one-infographic-about-the-digital-revolution-you-need-to-understand

50%
50%
clrmoney
clrmoney
2/9/2016 12:29:12 AM
User Rank
Platinum
business iot
There will be many internet connections with things going virtual for businesses etc. So I think this is a good thing for iot in business because I'm in the IT world.

50%
50%
Ariella
Ariella
2/5/2016 10:50:09 AM
User Rank
Author
Re: IoT security security security...
@mhhf1ve I have heard of some very sophisticated hackers who learn consumer patterns and imitate them when drawing on their credit cards and such so that they don't trigger the usual alerts. The flip side is the fact that most alerts I do see for my credit card are for charges I've made, some even repeating at the same merchant regularly. So it seems to me that monitoring algorithms are still very faulty.

However, I recently spoke to someone about the alert system used at his business, which he says would send out an alert as soon as an unauthorized user or transfer of data occurs. Their main concern is securing sensitive employee data held on file and preventing any consumer credit card information from remaining in the system. The latter is a breach of compliance that can lead to fraudulent uses, as well as fines for the company.

50%
50%
mhhf1ve
mhhf1ve
2/4/2016 9:08:23 PM
User Rank
Platinum
Re: IoT security security security...
> And those in the industry would be wise to be proactive about it...

I think there's a somewhat new approach that secures devices by monitoring for unusual traffic and doing some deep packet inspection to make sure private information isn't being lost. So the security isn't keeping *everything* out, but constantly looking for breaches as they may occur (and I assume seeding "fake sensitive" data so that breaches can be detected more easily).

Essentially, the bad guys would have to know "exactly where to look" the first time they infiltrated the system -- because if they poked around too much and did things that real authorized users don't normally do, then they'd get flagged and shut out. Bots don't behave like real people do... but perhaps this method will fail when more people are using bots to do their "real" work?

 

50%
50%
Ariella
Ariella
2/4/2016 7:55:07 PM
User Rank
Author
Re: IoT security security security...
@Dhagar definitely, the more connections grow, the more security needs grow. And those in the industry would be wise to be proactive about it, building systems with plans for security rather than adding it on only after breaches occur.

50%
50%
DHagar
DHagar
2/4/2016 7:50:45 PM
User Rank
Platinum
Re: IoT security security security...
Ariella, I believe that there are consumer-directed security devices, as you point out, for the mobile components.  I think this will continue to evolve around the devices themselves (i.e., biometrics and smart technology).    Additionally, I think the other component is the cultural change involved in creating new models:  service networks and the new dimensions of data/analytics that will come from IoT.

I think the industrial transformation will result in platforms, with network security, and new partnerships, governances, and data sharing, that will deliver new value through these connected data channels.

This will keep us busy staying up-to-date on this evolution.

50%
50%
Ariella
Ariella
2/4/2016 1:44:57 PM
User Rank
Author
Re: IoT security security security...
@mhhf1ve yes, the person I interviewed agreed that they are not secure enough for data that you really want to keep for your eyes only.  With any security measure, there always has to be an assesment of the perfect balance of security with cost and convenience. You can make things more secure than they currently are, but you have to question if people are willing to pay that much more for the more secured device and if they are willing to go through various authentication steps to access their appiatons -- a cost of convenience.  

100%
0%
Page 1 / 2   >   >>


Latest Articles
Italy's 5G auction could exceed a government target of raising 2.5 billion ($2.9 billion) after attracting interest from companies outside the mobile market.
The emerging-markets operator is focusing on the humdrum business of connectivity and keeping quiet about some of its ill-fated 'digitalization' efforts.
Three UK has picked Huawei over existing radio access network suppliers Nokia and Samsung to build its 5G network.
Vendor says that it's its biggest 5G deal to date.
Verizon skates where the puck is going by waiting for standards-based 5G devices to launch its mobile service in 2019.
On-the-Air Thursdays Digital Audio
Orange has been one of the leading proponents of SDN and NFV. In this Telco Transformation radio show, Orange's John Isch provides some perspective on his company's NFV/SDN journey.
Special Huawei Video
10/16/2017
Huawei Network Transformation Seminar
The adoption of virtualization technology and cloud architectures by telecom network operators is now well underway but there is still a long way to go before the transition to an era of Network Functions Cloudification (NFC) is complete.
Video
The Small Cell Forum's CEO Sue Monahan says that small cells will be crucial for indoor 5G coverage, but challenges around business models, siting ...
People, strategy, a strong technology roadmap and new business processes are the key underpinnings of Telstra's digital transformation, COO Robyn ...
Eric Bozich, vice president of products and marketing at CenturyLink, talks about the challenges and opportunities of integrating Level 3 into ...
Epsilon's Mark Daley, director of digital strategy and business development, talks about digital transformation from a wholesale service provider ...
Bill Walker, CenturyLink's director of network architecture, shares his insights on why training isn't enough for IT employees and traditional ...
All Videos
Telco Transformation
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2021 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with