We are now in the era of IoT “Internet of Things”. It’s a concept that not only has the potential to impact how we live but also how we work. And as things become more connected, people become more concerned about their security and privacy. I have gone through a lot of technical conversation about IoT and realized how paranoid people are about their connected devices and appliances.
The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart objects or networks such as Wireless Sensor Networks (WSNs). By 2020 there will be over 26 Billion connected devices and some estimate this number to be more than 100 Billion connected devices. This includes mobile phones, Smart TVs, washing machines, wearable devices, Microwave, Fridges, headphones, door locks, garage door openers, scales, home alarms, hubs for multiple devices, remote power outlets and almost anything else you can think of like your car and airplane jet engines.
Ways of securing the traditional Internet networks have been established and tested. The IoT is a hybrid network of the Internet and resource-constrained networks, and it is, therefore, reasonable to explore the options of using security mechanisms standardized for the Internet in the IoT.
What will we do about managing the usernames and passwords of every single connected device? What about our privacy? What if some hacker was able to control our video cameras? More and more questions are being asked and more security concerns are being escalated. Do we really have to be paranoid about IoT?
IoT was already there
Most of us have Computers, Laptops, Tablets, Mobile phones, Printers, Game consoles, Media players, Storage device, Video Cameras and Satellite Receivers which are already connected to our home networks. Those are some of the Internet of Things devices and we were OK with that although if some hacker could hack into one of the cameras connected to one of the Laptops or even to one of the Smart TVs, he could see what’s going on inside the home
So what is the problem?
The problem is not with IoT, the problem is with how we understand IoT. IoT not only means the interconnectedness of appliances, computers, microprocessors and machines, all of which have IP addresses or some form of digital identification, it also means the interconnectedness of devices coupled with automated and centralized data collection and analysis capabilities from those devices or processors linked to them. This leads to tremendous possibilities to develop new applications for the IoT, such as home automation and home security management, smart energy monitoring and management, item and shipment tracking, surveillance and military, smart cities, health monitoring, logistics monitoring and management. Due to the global connectivity and sensitivity of applications, security in real deployments in the IoT is a requirement.
Cisco is very clear about IoT Security:
“IoT security requires a new approach that combines physical and cyber security components.”
Learn how Cisco can help you more securely implement the opportunities and benefits the IoT can bring. IoT Security
Please watch this video, where Dan O’Malley and “Rick the Radio Guy” give an overview about how Cisco IPICS open standards and integrated technologies enable Internet of Things Secure Mobile Communications and Communications Interoperability to support mission needs for Public Safety, Defense, Manufacturing, Utilities, Transportation, Mining, and more.
At Cisco, we often talk about the power of the Internet of Everything– to reduce traffic congestion, to refresh our refrigerators, to make our everyday lives more convenient. But now, the Internet of Everything is saving lives.
In 2012 alone, more than 1.7 million women were diagnosed with breast cancer — that’s more than 4,600 women diagnosed with this life-threatening illness every day.
It can be hard to wrap one’s mind around just how common, and equally devastating, cancer can be. It has affected me personally, as well as the lives of my closest family members and friends. When it touches your life, or those around you, the impact is deep and long lasting.
Statistics on the prevalence of breast cancer and the personal stories of those impacted can be frightening, but there is more than just hope. Incredible strides across all forms of cancer are happening, and in many cases, they come in the form of early detection through ground-breaking technology.
You’ve heard of the Internet of Things (IoT). In fact, you’re probably wearing a FitBit or Jawbone on your wrist. You may be the owner of a smart thermostat like Nest. Or you’ve recently heard the hype about self-driving cars.
These connected devices are changing the way we live, work and play – and there are many more to come.
Today, only 1% of all devices that could be connected to the Internet are connected to the Internet.
By 2020, 20 billion devices will come online, amounting to a $19 trillion market opportunity for businesses and consumers. This next era of the Internet – the Internet of Everything (IoE) – will connect not only things, but also people, process and data to transform how we track our fitness, regulate traffic, conserve energy, tackle poverty and more.
Have you ever been slaving away at work all day, yet somebody asks, “Where have you been, I have been looking for you all day and by the way, have you seen James?” Well, CMX (Connected Mobile Experience) along with a cool mobile app can tackle those questions and more.
To start, Cisco Connected Mobile Experiences is a solution that lets organizations leverage their existing Wi-Fi infrastructure for business analytics, and transform the way they connect with their mobile end-users. With CMX, we provide the engine for developers to build apps with the Mobility Services APIs that can show where I have been on the floor and a user locator to find out where James has been.
So, what can you do with the CMX Mobility Services APIs? Read More »
Today, I am pleased to share two more milestones marking the continued success of our open innovation strategy at Cisco, with Cisco EIR helping to lead the way.
Cisco EIR Demo Day 2014
On December 8th, 2014, we celebrated the successes of the startups in our inaugural cohort with our first Cisco EIR Demo Day (photos) a gathering of over 100 attendees, including Cisco business and technology leaders, VCs, partners and others from the Silicon Valley startup community.
Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pressure to improve the security of their networks and protect sensitive client data. While attackers have always targeted IT users, in 2015 the trend is shifting where the primary target is to take advantage of user behaviors to breach the network. This last point is important because once the user has been compromised or their credentials have been lifted, the attacker then has access to anything important that is connected. The Cisco 2015 ASR shows that only 43% of organizations leverage identity administration and provisioning to properly secure their networks and data. This means that over half of organizations don’t know who is accessing their networks, where they’re going or coming from, or what they’re using and if it is even authorized based on business policy. As we all know, once someone unauthorized gets inside it can be challenging to track down the incursion and negate the threat.