Unpacking IoT, a series: The complexity challenge and what you can do about it
In my previous two blog posts, I explained how Cisco addresses the security and scalability challenges associated with an Internet of Things (IoT) deployment. In this post, I cover the final of the top three challenges: complexity. For an IoT initiative to be successful, the deployment and management of connected devices must be made simplified. […]
Unpacking IoT, a series: The security challenge and what you can do about it
Network engineers face a number of challenges when deploying Internet of Things (IoT) initiatives. Come back to the Cisco IoT blog over the next few weeks as we dive into the top three IoT challenges, and best practices for conquering them.
The Criticality of the Network in Securing IoT and Critical Infrastructure
To demonstrate the vital role of the network in IoT Security, we explore how it can help us tackle a series of IoT-related security challenges.
How Manufacturers Can Manage Increasing Cybersecurity Risks
We understand how hard it is to build a secure factory and digital framework, and how to deal with the accompanying uncertainty. We are ready to help guard against vulnerabilities.
Cisco Empowers Partners to Accelerate Their IoT Business
At the Cisco Partner Summit in Las Vegas, our customers discuss how IoT is changing their businesses. We also show our partners how Cisco can accelerate IoT opportunities.
Laying the Foundation to Secure Critical Infrastructure
With the rising wave of global Digitization, Industry 4.0 and the Industrial Internet of Things (IIoT) are demanding more network connectivity and creating greater opportunity for scalable internet-based attacks. It’s more critical now than ever that the foundational building blocks of Industrial and Automation Control Systems (IACS) incorporate capabilities that can withstand today’s internet threats.
Attackers turn to IoT and ICS to find gaps in security
Research from Cisco and partners reveal increased interest in IoT and ICS from security professionals and attackers alike, due to IoT systems’ ability to automate and communicate with devices.
Cybersecurity – The Flipside of Digitization
It used to be science fiction. Now, it’s real. Hackers can use an unprotected infusion pump on the network as a gateway to your hospital’s data. A staff member might...
Securing the IIoT: Your Opportunity to be a Cyber Hero
There’s tremendous potential for operational technology (OT) and information technology (IT) professionals right now, to be cyber heroes in any organization tackling security for the Industrial Internet of Things (IIoT).