Two years ago Gartner claimed there will be over 25 billion smart devices in use by the year 2020; 2013 saw Cisco says the global internet of things market will be worth approximately £14.4 trillion by 2022.
With this gargantuan industry looming on the horizon, the tech community is awash with fears over how we're going to keep these IoT networks secure.
Never fear - it turns out that blockchain may have valuable uses well beyond Bitcoin and cryptocurrency. The following infographic offers an explanation of what blockchain is, how it works, and why any CISO worth his or her salt should be brushing up on their blockchain knowledge as the IoT revolution takes hold...
— Jeremy Coward, Community Manager, IoT World News
Want to learn more about how blockchain is penetrating the IoT market? There's an entire track dedicated to blockchain at Internet of Things World 2017 in Santa Clara this May.
Our interview with Boeing Senior Systems Engineer Robert Rencher reveals that aviation IoT has implications for digital factories and supply chains, but its the operational environment where the biggest inroads will be made.
Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.
Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.
Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.
The webinar will cover:
Identity Issuance: Security at Scale
Identity Management: Authentication and Authorization
Identity and Data Security: Data Integrity and Granular Policy Definition
Webinar attendees will learn:
How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
Methods for transmitting data from devices in the field to value engines securely and efficiently
Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
How to create a holistic and protected IoT ecosystem for your company