Menu

IoT FEATURE NEWS

IoT Evolution Expo Security Panelists Note the Power of Metadata

By Paula Bernier August 18, 2015

Metadata can tell a story just as well as, and maybe even better than, actual content in communications.

“The metadata may actually be more revealing than what you’re trying to protect,” said Matt Ramsay, vice president of business development at Accelerated Concepts.

Ramsay was a panelist yesterday for the IoT Evolution Expo session called “The Core of Securing Networks”. Rohini Pandhi, senior product manager of PubNub, was also on the panel, which was moderated by Clay Melugin, senior partner RMAC Technology Partners.

But the discussion was not reserved for these three session speakers. The audience was welcomed to participate in the discussion. In fact, one audience member took the metadata discussion a step further, suggesting that if you want to know when the U.S. military is getting ready for a big operation, you might be able to gauge that if calls for pizza delivery from the site are up.

The conversation eventually turned to a discussion about how Ramsay believes it’s important to bring security to the endpoint, or as close to the endpoint as you can.

Walling off is not the answer, he said, but layering can help. If you want to protect a house you can get a fence, a dog, put bars on the windows, and more – the point is there are multiple layers of protection. The same is true with networks and endpoints.

“It’s more than just bringing security to the appliance,” he said.

“You can’t always control you network,” he added, so take the network as close as you can to the endpoint, and take a layered approach in the network.

Melugin added that a recent 60 Minutes report featured a security expert showing how a hacker was able to read Gmail before it even got sent.

“It’s happening in the network,” he said.

“I can depend on the U.S. mail service to deliver my letter,” Melugin added. “I just don’t know how many people read it.” 




Edited by Stefania Viscusi

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

IoT Time Podcast S.2 Ep.33 Trusted Computing Group

By: Ken Briodagh    6/22/2017

On this episode of the IoT Time Podcast, Ken Briodagh sits down with Steve Hanna, chair of TCG's embedded systems and IoT work groups, and principal a…

Read More

IoT Time Preview: The Cloud

By: Ken Briodagh    6/22/2017

In this weekly series, we'll be previewing chapters of "IoT Time: Evolving Trends in the Internet of Things" for you to read in the hopes that you'll …

Read More

IoT Evolution Speakers: Lee Gruenfeld Speaks Out

By: Ken Briodagh    6/22/2017

Lee Gruenfeld is Managing Partner of the Cholawsky & Gruenfeld SaaS/IoT consulting firm, and is a Principal with the TechPar Group in New York, a bout…

Read More

IoT Evolution Speakers: Jeff Liebl Speaks Out

By: Ken Briodagh    6/22/2017

Jeff Liebl is President of Anaren IoT Group, which designs, manufactures and sells custom high-frequency solutions and standard components for the wir…

Read More

IoT Evolution Speakers: Israel Alguindigue Speaks Out

By: Ken Briodagh    6/22/2017

Israel Alguindigue is SVP, Industrial Practice, Uptake, a developer of products that solve industry pain points and enable new data-driven business mo…

Read More