Search

Articles for category Security


  • Securing IoT with Public Key Infrastructure (PKI)

    June 24, 2020

    Traditional PKI (Public Key Infrastructure) systems, with their reliability and effectiveness, have been successful in securing the IT ecosystem till date. It also makes them an inevitable candidate for securing the IoT ecosystem as well. Many existing IoT ecosystems are using PKI for achieving the CIA as it enables an organization to establish and maintain a trustworthy digital ecosystem (people, systems, and things) by managing keys and certificates.

     … read more
  • Securing IoT with Asset Management

    June 10, 2020

    Internet of Things (IoT) has revolutionized the field of inventory management. The availability of real-time and accurate data about the assets has changed the outlook of the game. With real-time data trickling in from the attached IoT devices, it is helping businesses to make more informed decisions, thereby, translating into bigger profits.

     … read more
  • Securing the Internet of Things with Intrusion Detection Systems

    March 20, 2020

    Network security today holds foremost importance to IT departments today and there is a need to encompass security methods that go far beyond just blocking unauthorized access to predictive modeling of these malicious attacks. Network-based intrusion detection systems offer highly effective protection against all intruder activities, malicious traffic, and con artist masquerading. Various machine learning techniques such as Artificial Neural Networks (ANN), Support Vector Machines (SVM), Naive-Bayesian (NB), Random Forests (RF), and Self-Organized Maps (SOM), etc can be used to develop a NIDS. A combination of signature-based and anomaly-based systems can best secure the enterprise network as it ensures the detection of both known as well as Zero-day attacks.

     … read more
  • Is Blockchain suited for GDPR?

    July 10, 2019

    GDPR moves the data ownership back in the hands of the data subject by providing them the fundamental rights to access, rectify, and erase their data stored by the businesses (or data processors). Even automated decision can be contested. Data processing needs consent as a foremost requirement. The individual has the full power to withdraw his consent anytime. In fact, if we look at the basic premise of GDPR, it is evident that the law is all about empowering ‘Data Subjects’ to have full control of their personal data.

    And that is where Blockchain comes in.

     … read more
  • Need for Security Testing of Mobile Apps

    May 22, 2019

    Bring-Your-Own-Device (BYOD) policy is hardly a novelty these days as enterprises now allow employees to access sensitive business data on their personal mobile devices. Hence, a large percentage of users utilize the same mobile devices for both business and own purposes. Also, they store a variety of personal and business data on their smartphones, tablets, or phablets. With the recent WhatsApp security breach fresh in our minds, it is not incorrect to say that mobile apps are vulnerable to critical security attacks. This, in turn, makes security testing of mobile apps imperative.

     … read more
  • How Blockchain Can Help Streamline Supply Chain Management

    May 08, 2019

    A supply chain consists of a network of interconnected businesses, right from procurement of raw materials to the delivered goods, in the hands of the consumers. This also entails the suppliers of raw materials, manufacturers, transporters, warehouses, retailers etc throughout the chain. To maintain a healthy and effective supply chain is a challenge, considering the myriad factors affecting it and the complex topology they present. As the hops in the supply chain keep on getting more and more dispersed, it becomes increasingly difficult to track and trace supplied goods.

     

     … read more
  • Cyber Security Risks that Accompany IoT and how to Mitigate Them

    December 07, 2018

    The Internet of Things is based on a centralized system of interrelated devices that are equipped with computing abilities. These devices have inbuilt UIDs, a set of unique identifiers that can transfer data through a network without requiring human interaction. The sensors in devices and appliances will collect different types of data and communicate, analyze or even act on it. With IoT, businesses can develop new ways to connect and increase value by building new businesses and channels of revenue. It is no secret that implementing solutions that involve the use of the IoT would provide seamless connectivity across all platforms, but at the same time, there’s a raging security issue that risks shutting down the entire set up.

     … read more
  • How Blockchain Can Make IoT Secure?

    November 22, 2018

    We are currently at the forefront of developing new and amazing systems by leveraging what Blockchain has to offer. The decentralized nature of Blockchain means higher levels of security. While it initially seemed like an excellent opportunity to improve financial institutions, Blockchain is showing growing potential in the healthcare sector, government, and now, the Internet of Things.

     … read more
  • Major Challenges in Implementing IoT Security

    March 23, 2018

    There is no standard approach to IoT security as it is not just about the device, or the network, or the clients, but a combination of several of these. Providing a solution that caters to the security requirements of participating entities i.e. the device, cloud, mobile application, network interfaces, device firmware and the ecosystem at large is a challenge.

     … read more
  • A Summary of How Blockchains are Disrupting B2B Industries

    March 19, 2018

    Blockchains are transforming many industries beyond just revolutionizing digital currencies. While a large part of our focus is on how blockchains can empower a new form of “digital currency” that avoids the pitfalls of our existing currency system (namely, reliance on a central authorities like banks, avoiding expensive transaction fees and money fraud due to double-spending (Double Spending, n.d.)), many other industries are leveraging other unique benefits of blockchains to help them digitize their B2B processes of automatic audits, verifiability and contractual agreements. This brief note will describe some of these industries and how blockchain is helping them transform.

     … read more
  • The many roles of Block chains in the Internet of Things

    March 08, 2018

    This brief paper will talk about how blockchains can be effectively used in IoT Networks and focuses on how it can help solve common issues of scalability, trust & cost. The paper also discusses some of the disadvantages of blockchains for this purpose and how they might be overcome.

     … read more
 
 

We use cookies (including third party cookies) to ensure you get the best experience while visiting our website. Click "Accept Cookies" to accept the cookie usage. Click "Cookie Settings" to adjust cookie settings.

Mandatory Cookies

These cookies cannot be disabled

These cookies are necessary for the website to function and cannot be switched off.

Cookies:
  • .ASPXANONYMOUS
  • .DOTNETNUKE
  • __RequestVerificationToken
  • authentication
  • dnn_IsMobile
  • language
  • LastPageId
  • NADevGDPRCookieConsent_portal_0
  • userBrowsingCookie

Analytics Cookies

These cookies allow us to monitor traffic to our website so we can improve the performance and content of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited or how you navigated around our website.

Cookies:
  • _ga
  • _gat
  • _gid

Functional Cookies

These cookies enable the website to provide enhanced functionality and content. They may be set by the website or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Cookies:
  • __atuvc
  • euconsent

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Cookies:

Not used.