Register to receive our newsletter and join in the conversation on our message boards!
REGISTER NOW
Comments
Newest First | Oldest First | Threaded View
mhhf1ve
mhhf1ve
2/15/2017 8:35:52 PM
User Rank
IoT Visionary
Re: not so sure...
Machine learning will play a part, in sure. Just as machine learning has drastically reduced the amount of spam in my inbox, but it's not perfect-- and the malware black hats seem to be motivated to come up with clever ways to fool algorithms.

50%
50%
vnewman
vnewman
2/15/2017 6:00:48 PM
User Rank
IoT Mover & Shaker
Re: not so sure...
True.  AI is not good for situations that require the capability to grap meanings and extrapolate data across a broad spectrum.  It has its shortcomings for now with respect to IoT security.

50%
50%
mhhf1ve
mhhf1ve
2/13/2017 7:42:03 PM
User Rank
IoT Visionary
not so sure...
I'm not so sure that machine learning will be essential for IoT security... It could be the case that simply only allowing authorized processes to run will shut down 99+% of all malware attacks. So then it just becomes a matter of making sure only authorized processes are run -- and verifying that there are identified human beings (or entities) behind every process. 

This might greatly curtail some of the functions that might develop, but is a limited IoT preferrable to a more powerful but less secure IoT?

50%
50%
dcawrey
dcawrey
2/9/2017 4:24:39 PM
User Rank
IoT Visionary
Re: Machine Learning's #01!
@Ariella That certainly could be considered a potential downside of the future for machine learning! 

As the good things happen, nefarious actors learn how to use these systems for bad.

50%
50%
afwriter
afwriter
2/6/2017 11:56:59 AM
User Rank
IoT Visionary
Re: Machine Learning's #01!
That is a part of it but I was more referring to the fact that in order for machines to learn that have to collect and store a ton of data, and who know how that data could be used to effect security.

50%
50%
Ariella
Ariella
2/6/2017 8:52:27 AM
User Rank
IoT Visionary
Re: Machine Learning's #01!
@afwriter Do you mean that the hackers can use their own machines to pick up on the habits of the systems they want to break into and so find which points are most vulnerable? 

50%
50%
Jeremy
Jeremy
2/6/2017 3:19:41 AM
User Rank
Blogger
Re: Machine Learning's #01!
Absolutely the case, we'll have to wait and see which "side" applies it to greater effect! 

50%
50%
dcawrey
dcawrey
2/3/2017 11:45:48 PM
User Rank
IoT Visionary
Re: Machine Learning's #01!

The one thing that I find highly interesting about machine learning is the things that it will be able to do humans currently cannot. When it comes to sensors and devices machine learning is going to be able to accomplish a lot more then we could ever think was possible.

50%
50%
afwriter
afwriter
2/3/2017 2:19:40 PM
User Rank
IoT Visionary
Re: Machine Learning's #01!
@Jeremy, I would tend to agree with you but, playing Devil's avocate here, doesn't machine learning also open up the potential for security breaches? At the very least there are privacy concers with the amount of data machines collect to learn right?

50%
50%
Jeremy
Jeremy
2/3/2017 6:06:42 AM
User Rank
Blogger
Machine Learning's #01!
Of the many potential solutions that are likely to play a role in improving IoT security (and cybersecurity in general) in the near future, I'd say machine learning and related technologies are the most important. 

50%
50%


Latest Articles
In Gothenburg more so than other burgeoning smart cities, silos are seen as the enemy. And no one knows this better than Ann-Louise Hohlfält, urban development officer for the City of Gothenburg.
Virtual reality and augmented reality remain nascent technologies, but Mastercard is already working on its plans to leverage them as they anticipate mass adoption among consumers.
We speak with Rinat Guy, CIO for the Municipality of Israel's award-winning smart city.
Industrial internet leader Bosch tells us about the IoT power tool products their working on & how long until these solutions hit the mass-market.
Our interview with Boeing Senior Systems Engineer Robert Rencher reveals that aviation IoT has implications for digital factories and supply chains, but its the operational environment where the biggest inroads will be made.
Upcoming Live Events
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Millennium Gloucester Hotel, London
June 13-15, 2017, ExCeL, London
June 13-15, 2017, ExCeL, London
All Upcoming Live Events
Flash Poll
Video
Wilhelm Nehring, CEO of ThyssenKrupp Elevator UK, talks through his favorite applications of IoT in buildings and cities with IoT World News.
David Holecek, Director of Connected Products & Services at Volvo Car Group , speaks with IoT World News on Volvo's moves in the connected car ...
Liat Ben-Zur, SVP and digital technology leader at Philips, describes the plethora of ways IoT will be used to transform healthcare via hospitals, ...
Richard Corbridge, CIO at Health Service Executive, explains how IoT is already impacting digital healthcare in Ireland and where he sees the ...
Mimmis Cleeren, Global Director of marketing (IoT BU) at MediaTek, covers some of the special IoT projects that have emerged from MediaTek's ...
All Videos
Webinars
ARCHIVED
Tuesday, March 14, 2017
1:00 p.m. EST

Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.

Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.

Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.

The webinar will cover:

  • Identity Issuance: Security at Scale
  • Identity Management: Authentication and Authorization
  • Identity and Data Security: Data Integrity and Granular Policy Definition

Webinar attendees will learn:

  • How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
  • Methods for transmitting data from devices in the field to value engines securely and efficiently
  • Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
  • How to create a holistic and protected IoT ecosystem for your company

Information Resources
All resources
Twitter Feed
like us on facebook
IoT World News
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with