The Internet of (Secure) Things
The “Internet of Things”, or IOT: we’ve all heard the term, but what does it really mean? More importantly, how do we secure all of these … “things”?
Managing the Invisible Network (IoT)
Ah, the good old days, when things were simple. When there were a known number of devices on any government network, and the federal IT pro had a complete understanding of how to secure those devices.
An Internet of Things Demo Jam: Architecting the Scene
I believe that the Internet of Things (IoT) is a popular topic, in part, because its science-fiction becoming science-fact. IoT promises all of the conveniences of “The Jetsons” without having to push buttons, while threatening to produce the surveillance states of “1984” or “Minority Report”. Unfortunately, it most likely will give rise to the annoying doorways from Douglas Adam’s “Hitchhiker’s Guide to the Galaxy”, that have micro-transactional charges per use and in-app purchases that “allow” the door to open after 5pm. For our
Detect and Secure IoT and Rogue Devices, While Satisfying NIST RMF Security Requirements
We all know that the Internet of Things (IoT) is here. But IT professionals responsible for enterprise communications networks aren’t exactly sure where IoT resides on their networks or whether these devices are secured. Rogue devices are everywhere (although not all are out to steal the blueprints to the Death Star) but according to a survey sponsored by ForeScout Technologies, only 30% are confident that they know what IoT devices are on their network.
The Internet of Things is at Work in Our Cities this Winter
The “Internet of Things” – it’s everywhere right now!
The “Internet of Things” or IoT, for short, refers to the next evolution of the internet when everyday objects are networked to the web and each other. Smart watches, connected cars, appliances, houses, and more – very soon every physical thing will be accessible through the internet.
In government, the uses are also equally infinite - from monitoring the building energy use (currently happening over at the General Services Administration) to tracking vehicle locations and maneuvers (being explored by the DoD).