Telular Corporation, a technology leader and provider of IoT (Internet of Things) solutions, today announced that it has surpassed one million IoT subscribers in the commercial telematics and security markets. To drive continued growth, the company has strengthened its position in the commercial telematics space by realigning its recent acquisitions under the SkyBitz business unit.
We’re on the cusp of a Cambrian explosion in smart home products. The speedy march of technology is churning out everything from connected bottle openers to automated window blinds, keyless locks, and security cameras that text you when someone breaks into your home.These technologies can offer unprecedented levels of information and automation. But with so many potential places to start, it’s time to get smart about setting up a smart home of your own.Curbed checked in with a handful of experts including Nest Platform Head Greg Hu, Canary co-founder & Chief Design Officer Jon Troutman, Amazon Alexa Director Charlie Kindel, IFTTT CEO Linden Tibbets, and LittleBits Director of Product Design Krystal Persaud—all to get their takes on the best smart home products and how to transform your dumb home into a smart one.
While the advent of smart home solutions has created new revenue streams for residential security companies and subsequently increased the value that an alarm system provides to consumers, the technology still faces several challenges that could hinder its growth moving forward. In fact, according to Tim Hewitt, analyst for security and building technologies at IHS Markit, while the initial uptake of smart home systems by early adopters was in line with expectations, existing market barriers have become more significant as companies have tried to expand their offerings to the broader market. As a result, Hewitt said the market research firm has revised its forecasts to account for the lack of broader consumer interest in connected home products.
If consumers are shopping for smart-home products, security is likely top of mind.According to The NPD Group’s Connected Intelligence service, four out of 10 consumers who are at least somewhat interested in a smart home ranked making their home more secure and safe as the top reason driving their interest.
The U.S. Department of Energy (DOE) will provide up to $15 million in funding to help strengthen and protect the nation’s electric grid from cyber and physical attacks, pending congressional approval.
Comcast is pushing ahead on a plan to take Xfinity Home, its home security and automation platform, to the next level in part by broadening a curated mix of devices that work with the platform while also adding elements that drive more value into the service and reduce service friction. “First and foremost, we have over the past year and a half focused heavily on disrupting the home security market,” Dan Herscovici, senior vice president and general manager of Xfinity Home, said in an interview soon after he keynoted the Parks Associates Connections conference in San Francisco on Tuesday (May 24).
At this week’s Chicago IoT Meetup, Roman Budek of NXP gave a talk on understanding and implementing embedded system security. What follows are the high points of the talk:
1. What makes IoT security unique? The IoT will consists of billions of connected, embedded devices. The more embedded devices connected to a gateway, the greater the security risk..
2. Why is it important to secure all end nodes? If a connected thermostat for a commercial freezer in a restaurant was hacked, the result could be food s
To help companies mitigate risks associated with an increasingly connected world, ICSA Labs, an independent division of Verizon, is rolling out a new security testing program to provide assurance testing for Internet of Things (IoT) devices and sensors. The program is believed to be among the first-of-its-kind.ICSA Labs will test six components as part of the new IoT Security Testing and Certification Program including: alert/logging, cryptography, authentication, communications, physical security, and platform security. The ICSA Labs Product Assurance Report found the majority of security devices fail to perform as intended.
For years, organizations have turned to security events and logs, aka machine data, to meet compliance requirements for regulations and mandates such as PCI, HIPAA, FISMA, GLBA, NERC, ISO, COSO, and the EU Data Directive. These compliance requirements typically include security event logging and retention, threat detection and alerting, and incident review and response. Additionally, organizations must measure the effectiveness of the many technical controls required by these regulations and mandates.In the past, organizations have turned to traditional Security Information and Event Management (SIEM) software to meet these requirements. SIEMs centrally collect event and log data from security devices. In turn, these logs can be harnessed for cross-data source correlations and rules to detect threats, after-the-fact incident investigations and response, and for compliance reporting.
For the past couple of years, it seems that everyone who talks about the Internet of Things (IoT) also talks about the challenge of security in IoT. (See this December 2013 post, “Securing the Internet of Things: Where Do You Start?“) In a recent study of IoT developers, security is seen as a leading concern. Any IoT platform that developers use must have an answer to how to secure IoT solutions, and IBM® Watson™ IoT platform has definitely built security into theirs.