Menu

IoT FEATURE NEWS

New Approaches to Cybersecurity Necessary in the Age of IoT

By

Risk management and threat assessment are absolutely critical as the Internet of Things (IoT) creates opportunities and security challenges for organizations. As companies and end users become increasingly connected, processes and technologies must be in place to monitor and manage a huge number of connected devices and applications.

GreyCastle Security is in the business of risk management and operational security and understands why organizations need to adopt a systematic approach when it comes to cybersecurity. GreyCastle CEO Reg Harnish is set to bring that message to the IoT community this week, and will be engaging with participants at the ITEXPO and IoT Evolution events in Ft. Lauderdale.

“Corporate America is taking a beating from a security perspective,” said Harnish. “A staggering increase in cybercrime coupled with increased government regulations have left most businesses vulnerable to both auditors and hackers. With greater connectivity comes more exposure, and while some may view that as a risk, we think it’s an opportunity to re-think the way companies protect their assets and their people.”

Harnish will be leading two conference sessions designed to educate companies and administrators about new approaches to mobile and cybersecurity in the age of IoT. “Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile Insecurity” will be presented tomorrow, January 26 at the IoT Evolution Conference at 3:45 p.m. ET. The conference session will focus on the rise of the smartphone and how its pervasiveness has created serious security and privacy risks, many of which are unknown and unmanaged by companies and IT teams.

The “Cybersecurity as a Service – Faster, Easier and Better” session will take place at MSP Expo (collocated at ITEXPO) on Wednesday, January 27 at 2 p.m. ET. Harnish will discuss the value of Managed Security Services (MSS) and how they have transformed the approach to security and mitigated business risks in the age of IoT.

“Yesterday’s cybersecurity solutions won’t address tomorrow’s threats,” added Harnish. “At ITEXPO, we’ll discuss a systematic approach to identifying vulnerabilities, and we’ll identify processes that can eliminate them before they cause problems.”    




Edited by Kyle Piscioniere
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

IoTevolutionworld Contributing Editor

SHARE THIS ARTICLE
Related Articles

Assessing IoT Innovator LTIMindtree: Its 2023-24 Successes to Date and a Peek at What's Next

By: Alex Passett    4/24/2024

IoT Evolution World has presented a brief rundown of LTIMindtree's successes during FY24, as well as a peek at what's to come for the Internet of Thin…

Read More

Powering Adaptability in IoT: Telit Cinterion Reveals its First High-Precision GNSS Module

By: Alex Passett    4/22/2024

Telit Cinterion announced the launch of its SE868K5-RTK module, a high-precision Global Navigation Satellite System (GNSS) receiver capable of centime…

Read More

ICYMI: Your 'IoT TGIF' News Review

By: Alex Passett    4/19/2024

We've compiled several Internet of Things (IoT) stories that will benefit readers interested in global IoT market growth, Industrial Internet of Thing…

Read More

Tracking the Growth of IoT: Global Industry Revenue, Uses Cases, and Security for What's Next

By: Alex Passett    4/18/2024

Citing data from the likes of Stocklytics, Statista and Earthweb, further study of the rapidly evolving Internet of Things is always recommended.

Read More

ICYMI: Your Weekly IoT News Review

By: Alex Passett    4/12/2024

We've compiled a handful of important Internet of Things (IoT) news stories that will benefit readers interested in consumer-facing developments, indu…

Read More