Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Discover 2019 News Cisco Partner Summit 2019 News Cisco Wi-Fi 6 Newsroom Dell Technologies Newsroom Hitachi Vantara Newsroom HP Reinvent Newsroom IBM Newsroom Ingram Micro ONE 2019 News Juniper NXTWORK 2019 News Lenovo Newsroom Lexmark Newsroom NetApp Insight 2019 News Cisco Live Newsroom HPE Zone Intel Tech Provider Zone

10 Security Predictions For 2015

From a growing army of cybermercenaries to a dire warning for lethargic resellers, this list of security industry predictions ditches the vendor hype for a dose of reality.

Back 1 ... 2   3   4   5   6   ... 11 Next

photo

8. Meaning Of Internet Of Things Emerges

Speak to any security industry veteran, and they will say there has been a lot of hyperbole about an increased threat posed by the "Internet of Things," but provide few details about exactly what risks Internet-connected devices truly pose to consumers and businesses. Nearly every security vendor predicts threats posed by an increasing number of Internet-enabled devices. Security vendor Cyberoam warns that as supervisory control and data acquisition (SCADA) systems adopt "IOT" it could increase risks to critical infrastructures.

The discussion will turn to software security and getting manufacturers of sensitive devices that contain embedded systems to bolster their security vulnerability response processes. Manufacturers of connected devices should create a way to patch critical vulnerabilities. It's a problem easier said than done, and may come down to dollars and cents, embedded systems experts tell CRN. A manufacturer of an Internet-enabled teddy bear will accept the risk that the bear's embedded OS could become corrupted. On the other hand, health-care organizations will increasingly hold medical device manufacturers to a much higher standard and, in turn, may pay a premium to do business with a maker of wearable medical gear that can demonstrate its strong security approach.

 
 
Back 1 ... 2   3   4   5   6   ... 11 Next

sponsored resources