Medium affb867f 4bef 41c9 98d3 2c4244c60b42

Making IoT more secure with blockchain

Despite rigorous research and aggressive adoption, IoT infrastructure faces major security issues. Hence, several researchers and developers are exploring enhanced security protocols provided by blockchain. Blockchain has already introduced a secure platform for cryptocurrency transactions. Similarly, the utilization of blockchain in IoT will lead to the development of distributed ledger for interfacing multiple connected IoT devices. With such an approach, data storage and networking of IoT-powered devices will be drastically improved.

Medium 60d05963 94b5 446c 89ae 4a02d3cf01a8

Cyber Security in the “When-Not-If” Era

Many large organisations now assume that breaches are simply inevitable, due to the inherent complexity of their business models and the multiplication of attack surfaces and attack vectors which comes with it. This realisation changes fundamentally the dynamics around cyber security. Historically, cyber security has always been seen as an equation between risk appetite, compliance requirements and costs. Compliance and costs were always the harder factors. Risk (was always some form of adjustment variable.

Medium 12e5643d df44 4847 917a bea747e55788

The Digital Transformation and the Role of the CISO

Privacy and security considerations are the key ingredients of digital trust and must be at the heart of any industry’s digital transformation. The necessarily transversal nature of security and privacy matters needs to be woven into the fabric of an organisation for the digital transformation to succeed over the long-term. At this junction, the traditional role of the CISO – heavily influenced by a technical bias, tactically-oriented and project-driven in many firms – could become exposed.

Medium 4ab75f6d 136c 44e8 87d9 68ab73c075e8

Here’s how Internet of Things malware is undermining privacy

The Internet of Things (IoT) is increasingly part of our everyday lives, with so-called “smart” devices. But for all their undoubted technical merits, they also represent a growing threat to privacy. There are several aspects to the problem. One is that devices may be monitoring what people say and do directly. Another is the leakage of sensitive information from the data streams of IoT devices. Finally, there is the problem summed up by what is called by some “Hyppönen’s law“: “Whenever an appliance is described as being ‘smart’, it’s vulnerable”.

Medium 1bfe998e 08ad 47ea a425 cc0dabb325d6

Benefiting from Data Privacy Investments

Data breaches are causing companies and organizations everywhere to re-examine the things they procure, the services they use, the individuals they hire, and the people and firms with whom they partner and do business. Across the board, organizations have sunk money into staff, strategies, and equipment to comply with new, tighter customer privacy rules and sidestep major fines and other penalties. Privacy laws and regulations worldwide are evolving and expanding. And the ones that took early action to address security concerns are seeing positive results from their investments.

Medium 4de1c173 b689 444e 9870 52621754b0ad

Who wants to be a CISO?

Cybersecurity has developed a high profile in many organisations over the past few years. But, who wants to be a Chief Information Security Officer these days? And at which stage in your career should you consider the move? What balance of managerial and technical experience do you need to have?  And where do you go from there? Those would be valid questions for many executive positions but when it comes to the role of the CISO, they seem to acquire a different meaning.

Medium 91abc1a4 28e2 4dd9 afb3 4b811e2ef0df

Before You Dive Into IoT, Do These Three Things

Interconnected IoT devices are deployed primarily to collect data. Algorithms analyze numerous data parameters and identify trends that then enable applications to deliver innovative services. Because data is at the center of IoT, and because this data is often associated with the people who are ultimately the recipients of the services, keeping the data confidential is paramount. We discuss the three most important things you should do before you dive into IoT, and how you can identify common pitfalls to ensure you adopt this new technology with confidence.

Medium fa01147d b863 4fc8 8b7d d4b80b2dd86d

IoT Security: A simple matter of common sense for product developers and investors

IoT security issues arise from ill-advised prioritization and the inherently short-term culture of the tech world. Security should be seen as a fundamental requirement for any IoT product—even MVPs. As the attitude of consumers and regulators shifts around those matters, it's becoming a simple matter of good business. Frankly, given the virulence and widespread nature of cyber threats, the need to take security seriously and embed it natively into IoT products should be seen as a simple matter of common sense for product developers and investors.

Medium 4144c345 9a7e 4692 ba11 48b2abd01baa

How IoT Can Transform Retail

Adopting IoT tools for the retail environment allows customers to interact both directly and indirectly with everything in the store. This presents incredible business opportunities. It can be daunting trying to step into the IoT space, though, and that fact keeps many businesses from embracing a lucrative transformation. Delivering a personalized, unique experience with IoT devices presents more than a simple opportunity to boost sales. You also establish a closer relationship with buyers and potential buyers, generating customer affinity and increasing brand equity.

Medium 1babdea1 23bf 4b91 a4e5 3a860f49af28

How Enterprises Are Using IoT to Improve Business

Equipment deployed in construction, agriculture, and healthcare can benefit from IoT-enabled predictive maintenance and asset tracking. There’s also a developing opportunity to use IoT to enable new business models for providers of such assets that can shift to delivering them on an “as-a-service” basis. Cloud-based IoT connectivity management platforms can support delivery of such applications on a flexible and cost-effective basis, even enabling dynamic pricing changes. Connectivity among people, things, and businesses is increasing exponentially. Old business models and processes are being rethought and new ones are emerging.

Medium 2955ff9b c0c8 4670 b9b2 b752197ec319

Improving Infrastructure Reliability by Understanding IoT Dependencies

Within the field of computer networking, there are examples of solutions that have been implemented to understand infrastructure dependencies.  As an example, Voice over Internet Protocol (VoIP) phones and network switches can determine the precise point of connectivity using a protocol known as Link Layer Discovery Protocol. In the Internet of Things (IoT), such a nifty standardized mechanism to determine dependencies does not exist. Here we explore examples of where sensors with this embedded ability would be useful and would contribute to the overall better experience and greater reliability.

Medium 5ff71b66 557d 49a4 a6fe 2bcc8434fbf5

IoT for Retail Loss Prevention: Boon or Bane?

IoT-enabled services are being adopted to provide user-friendly and aesthetic ways to address retail loss prevention. However, certain post-deployment observations have revealed some issues with IoT, relating to customer experience and the technology's ineffectiveness in addressing the real reasons for which it was originally deployed. IoT technology alone may not be the answer to solve certain business problems. As we have seen with the retail article tethering case, sometimes traditional and technological solutions may be complementary and have to co-exist, unless the technology is robust enough to overcome all possible user experience issues associated with its adoption.

Medium 2bbae98b 836f 48e0 8c39 334428fbdea0

When Every Millisecond Matters in IoT

One of the big promises of IoT is understanding the physical world around us and taking action based on insights and observations. Often, every millisecond counts—especially for use cases like earthquake monitoring. We need to build real-time networks for these mission-critical scenarios that can keep up. We have sensors everywhere distributed across nature and remote areas of the world—always on and always streaming new readings as they happen. This has transformed our understanding of how we work and live because we have more up-to-the-second data and analysis than ever before.

Medium fdf76f47 bc3c 41f8 ba0e b5053df448db

Success with the IoT starts with understanding 'Thing Management'

Industrial Internet of Things is the next industrial revolution, bringing dramatic changes and improvements to almost every sector. But to be sure it’s successful, there is one big question: how can organizations manage all the new Things that are part of their organizations’ landscapes? The industrial IoT is all about value creation: increased profitability, revenue, efficiency, and reliability. It starts with the target of safe, stable operations and meeting environmental regulations, translating to greater financial results and profitability. But there’s more to the IoT picture than that. Building the next generation of software for Things is a worthy goal.

Medium b0a2621c 9cac 458d b4dd 7e68edb63233

Five steps to performing an effective data security risk assessment

To reduce risk, IT teams need to minimize the threats they're exposed to, the vulnerabilities that exist in their environments, or a combination of both. From the business side, management may also decide to evaluate the business impact of each data asset and take measures to reduce it. The central risk team must assign risk values of high, medium, or low for the potential loss of each valuable data asset. Using this process, a company can determine which data asset risks need to be prioritized.

Medium 1bbb3b36 7068 4ff6 bcd1 a33c36cb3c6b

Why Cyberattacks Are the No. 1 Risk

Business leaders in advanced economies see cyberattacks as their single biggest threat, even more so than terrorist attacks. This is no surprise because the business risks associated with cybercrime are growing along with companies' ever-increasing dependence on technology. Moreover, the massive growth in the use of smart devices has opened up a universe of new ways for cybercriminals to launch attacks through large-scale botnets. Modern corporate innovation and growth must be balanced against cyber-risk and IT stability.

Medium 0ffd7b86 b4c0 4928 acfc b5ab025d18ae

Top IoT Trends in 2019

The Internet of things is anything related to devices which are connected to the internet. We all are surrounded by such devices in our routine life. This is the reason why IoT development trends have shown remarkable growth in recent years. The continuous explorations by IoT development companies are the reason behind the constant changes in the Internet of Things Trends. Here are Top IoT trends in 2019. These Internet-of-Things trends in 2019 will surely upheave our lifestyle in some new surprising ways.

Medium 2a63e60f 8fe1 4808 9d28 511f6d493d02

Will Edge Computing IIoT solutions be a real trend in 2019?

The benefits of using Edge Computing / Machine Learning solutions are very attractive to manufacturers because allows minimize latency, conserve network bandwidth, operate reliably with quick decisions, collect and secure a wide range of data, and move data to the best place for processing with better analysis and insights of local data. The ROI in such IIoT Solutions is very attractive. But they will never get these benefits if they do not step up and change your outdated attitude and start soon their IIoT journey aimed at to provide tangible and innovative business value.

Medium b94ec9a9 ac00 42d3 8afa 6ff6331b3492

IoT’s Real Impact on Business

As the adoption of IoT began to ramp up, more things became apparent — particularly regarding the benefits it can offer the average operation. By utilizing the data collected and transmitted from connected devices, companies have seen unprecedented efficiency and cost improvements, but also many boons to oversight. These changes are largely positive, and they’re reported across all industries, from manufacturing to modern health care. However, all this change means the entire business world is in a constant state of flux, and it will stay that way, at least for the foreseeable future.

Medium 643c3309 5233 4744 97d6 207ba7b3993c

Resolving IoT Security Issues with Blockchain Technology

The potentials that exist in the application of blockchain technology and the Internet of Things are huge. The implementation of a blockchain decentralized approach to an entire IoT network can help in many ways. It will ensure proper security by ensuring the privacy and protection of data at all levels. In addition, blockchain can help resolve scalability issues and provide an effective functioning of the system as well. This article comes with an emphasis on network security.

Medium bb7f7fb9 f0d7 4050 bad2 01e834692020

How to Better Manage Data Across Devices

Bringing new technologies and devices aboard is non-negotiable for businesses these days. Whether it’s cloud computing for data access or a new productivity app that keeps every member of a team safe, technology is helping us do more with less — and remain profitable as competition heats up. But the data powering today’s business technology introduces potential risk too. Here’s a look at how to remain security-minded as you figure out how to make your business data more mobile and accessible.

Medium d07a0ef9 d8fd 4e04 a95c d22ce1ea58d3

Three critical data considerations for IoT analytics success

Analytics is inextricably linked to digital transformation efforts. It’s reasonable to say that without analytics, digital transformation is unlikely to be successful. With IoT-generated data rapidly increasing, businesses must have a clear picture of their desired outcomes in order to ensure that the analytics technology used to gain insight from that data is aligned with business needs. Any complete implementation of IoT analytics will require hundreds of decisions, but there are three vital ones that profoundly shape the optimal architecture for a business.

Medium 4afa11eb 4554 4eec 982f 329312713372

How banks can create a successful IoT strategy

The hand-shake between the consumer side and the supplier side in any transaction between things requires a financial exchange. This puts banks and payments at the center of every IoT ecosystem. In the future, as self-driving cars pay for tolls and fuels, payments will have to evolve to talk to these smart cars. In a smart city, banks will facilitate the exchange of not just finances but also customer information among various players in an ecosystem, for building services best suited for citizens. A successful IoT strategy for banks must span the three stages of the information value-chain.

Medium 3fcf7f49 3eee 4599 a986 5770fefdaad5

5G and smart cities trends for 2019

Smart cities are technologically led plans to create improvements in the urban built environment.  Major trends in the smart city space are expected to impact urban areas for the next five years. We can see the rise of 5G and smart cities are closely aligned with the expected growth in IoT.In fact, over the next decade there will be an increase in the adoption of IoT technologies in the development of smart city infrastructure and 5G network trials.

The Harvard Innovation Lab

Made in Boston @

The Harvard Innovation Lab