IoT & Cyber Security

This category is IoT & Cybersecurity, exploring the intersection of connected technologies and digital security. It features expert insights on IoT innovations, data protection, risk management, and strategies to safeguard businesses in an increasingly connected world.

Technology Innovation the New Currency of the Digital Age

By David Stokes The advent of the internet changed modern day lives irreversibly but the new game-changer is already here: mobile digital technology is changing...

Can Digitisation Save the Planet?

It is a big, big question with millions of small positive answers  Part 1 – digitisation & long-term economic success By John Bates  In a post-crisis...

Rethinking Network Security in the Age of the Internet of Things

By Aaron Portnoy The rapid onslaught of the Internet of Things poses new challenges to network security; each and every connected device is susceptible to...

Should We Give Connecting Ourselves to the Internet Pause for Thought?

By Jim Carlsson With each device that is connected to the internet comes a new opportunity for cyber-criminals to exploit and new ways for hackers...

The Internet of things: An Inside Perspective

By R. Richard Asselstine A data revolution is underway: the Internet of Things is giving a “voice” to billions, even trillions, of objects – connecting...

The Internet of Thingies

By Dr. John Bates Dr. John Bates describes how the concept of The Internet of Things has come into being and how exactly technology has...

Embedding Security in the Internet of Things

By Jim Carlsson The Internet of Things will mean a better-connected world, with huge possibilities for positive change – and big opportunities for cyber-criminals. Jim...

Internet of Things: Challenges and Opportunities

By S. C. Mukhopadhyay and N. K. Suryadevara The term “Internet of Things” (IoT) is used to describe embedded devices (things) with Internet connectivity, allowing...

Enter the Age of Intelligent Business Operations

By John Bates Is your firm stuck in the Customer Service Dark Ages? Or have you entered the Age of Customer Experience Management?...
Heartbleed

Open Heartbleed Surgery – Securing Against Further Vulnerabilities

By David Sandin David Sandin, product manager at Clavister looks at the implications of the Heartbleed bug and the use of open-source code libraries in...

Securing Mobile Targets

By John Vestberg While 4G and LTE networks deliver unprecedented bandwith and performance, they lack the inherent security of previous-generation networks.  Below, John Vestberg, CEO...

Unlocking the Internet of Things

By John Bates Big data is amassing like snow in a blizzard, forming an avalanche that threatens to bury anyone who ignores it. Below, John...

TOP READS OF THE WEEK

Prompting - AI hands

GenAI: Prompting A Better Marketing Strategy

By David Dubois and Joerg Niessing Amid the rise of GenAI, executives must master prompt crafting to optimize their marketing and sales strategies. In the ever-evolving world of digital marketing, the ability to craft impactful, audience-centric...
talented running colleagues

Navigating the New Frontier: Embracing Talent 5.0 While Paving the Way for Talent 6.0

By Iolanda Triviño, Simon L. Dolan, and Pedro Cesar Martinez In the changing world of employment, it's more important than ever to understand the shifts in talent dynamics that are defining our future as organizational...

LATEST FROM OUR COLUMNISTS

talented running colleagues

Navigating the New Frontier: Embracing Talent 5.0 While Paving the Way for Talent 6.0

By Iolanda Triviño, Simon L. Dolan, and Pedro Cesar Martinez In the changing world of employment, it's more important than ever to understand the shifts in talent dynamics that are defining our future as organizational...