|By Elizabeth White||
|August 2, 2014 02:00 PM EDT||
Big Data's Potential in Helping to Secure the Internet of Things
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons.
In the IoT vision, every new "thing" - sensor, actuator, data source, data consumer, routing intermediary, etc., - is a new security-relevant detail that stirs up a wide range of collateral security issues. In other words, every new networked IoT endpoint is a new potential attack vector or launching point that the baddies can exploit. Potentially, every time you plug in a new IoT-networked device that is infected with malware or simply open to unauthorized third-party exploitation, the vulnerabilities start. Someone somewhere might exploit the new access point to gain illicit access to sensitive secrets (business, consumer, government, etc.), to damage software and data, and to wage distributed denial of service attacks.
- Discuss how IT professionals should approach addressing the security challenges of IoT
- Describe IoT vulnerabilities at the device, application, and network level
- Present a multi-layered IoT-security vision that includes incorporation of robust security protections into IoT products plus more global approaches that rely on consolidated big-data-powered security incident and event management
Key session points:
- Comprehensive IoT security is multilayered: device and application endpoints, middleware and infrastructures, vendor ecosystems.
- Fortunately, the IoT industry and security professionals are beginning to address these challenges on many fronts.
- As new IoT technologies take hold and new threats reveal themselves, the global security framework will grow more complex.
- Ongoing refinement of IoT security standards, practices, and tools will go on indefinitely.
James Kobielus is an industry veteran and serves as IBM's Big Data evangelist, as program director for Big Data analytics product marketing, and as editor-in-chief of IBM Data Magazine. He spearheads IBM's thought leadership activities in Big Data, Hadoop, enterprise data warehousing, advanced analytics, and cognitive computing. He advises IBM's product management and marketing teams on big data analytics. He has spoken at such leading industry events as Hadoop Summit, Strata, and Forrester Business Process Forum. He has published several business technology books and is a very popular provider of original commentary on blogs and many social media.
A Rock Star Faculty, Top Keynotes, Sessions, and Top Delegates!
Internet of @ThingsExpo 2014 Silicon Valley, November 4-6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading IoT industry players in the world.
The growth and success of Internet of Things will be on display at the upcoming Internet of @ThingsExpo conference and exhibition in Santa Clara, CA, November 4-6, 2014.
All main layers of the IoT ecosystem will be represented at the Internet of @ThingsExpo - the infrastructure players, the platform providers, and those offering applications, and they'll all be here to speak, sponsor, exhibit and network.
for Internet of @ThingsExpo 2014 Silicon Valley
Internet of @ThingsExpo 2014 Silicon Valley "show prospectus" has shipped. Sponsorship, exhibit, and keynote opportunities can be obtained from Carmen Gonzalez by email at events (at) sys-con.com, or by phone 201 802-3021.
About SYS-CON Media & Events
SYS-CON Media (www.sys-con.com) has since 1994 been connecting technology companies and customers through a comprehensive content stream at www.sys-con.com - featuring over forty focused subject areas, from Cloud Computing to Web Security - interwoven with market-leading full-scale conferences produced by SYS-CON Events. The company's internationally recognized brands include among others Cloud Expo® (www.CloudComputingExpo.com), Big Data Expo (http://BigDataExpo.net), Virtualization Conference & Expo (www.VirtualizationConference.com), DevOps Summit (http://DevOpsSummit.sys-con.com), Internet of @ThingsExpo (http://www.ThingsExpo.com), SDDC Expo (http://SDDCExpo.sys-con.com), WebRTC Summit (http://WebRTCSummit.net), Government IT Conference & Expo (www.GovITExpo.com), Cloud Computing Bootcamp (www.CloudComputingBootcamp.com), and UlitzerLive! New Media Conference & Expo (http://events.sys-con.com).
Cloud Expo® is a registered trademark of Cloud Expo, Inc.
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Dec. 11, 2016 09:00 AM EST Reads: 642
"MathFreeOn.com is a line coding platform for engineers and scientists. When they want to solve an engineering problem and they have to use software - they have to pay a lot of money for licenses - but with MathFreeOn you don't have to pay a lot of money. Just go to our site and write the code and you can check the result right away," explained Simon Lee, CMO of MathFreeOn, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Cla...
Dec. 11, 2016 08:45 AM EST Reads: 574
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Dec. 11, 2016 08:00 AM EST Reads: 807
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
Dec. 11, 2016 07:30 AM EST Reads: 776
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
Dec. 11, 2016 07:00 AM EST Reads: 504
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Dec. 11, 2016 06:45 AM EST Reads: 2,324
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Dec. 11, 2016 05:45 AM EST Reads: 746
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Dec. 11, 2016 05:30 AM EST Reads: 752
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 11, 2016 05:00 AM EST Reads: 1,192
"We are a leader in the market space called network visibility solutions - it enables monitoring tools and Big Data analysis to access the data and be able to see the performance," explained Shay Morag, VP of Sales and Marketing at Niagara Networks, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 11, 2016 04:45 AM EST Reads: 682
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Dec. 11, 2016 04:30 AM EST Reads: 884
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Dec. 11, 2016 03:30 AM EST Reads: 1,177
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Dec. 11, 2016 03:00 AM EST Reads: 817
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
Dec. 11, 2016 02:45 AM EST Reads: 926
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Dec. 11, 2016 02:45 AM EST Reads: 1,809