Tag: IOT

Inexpensive and ubiquitous components will make the Internet of Things affordable. They may also make it an unmanageable security nightmare, says a Raytheon executive.

You Can Build An Open Source NEST Clone In One Day? Uh Oh!

I’ve been amazed at the herds of Johnny Come Lately’s who have glom’d onto the amazing Nest thermostat since Google purchased the company that makes it, Nest Labs, for a whopping $3.2 billion last week. Nest – and even its sister Protect smoke alarm – were hardly new, but that didn’t stop CNN from posting a ‘gee whiz’ video in the days that followed that had all the ‘we were here first’ excitement of a hand-held broadcast from the floor of CES. That – even though Nest is coming up on its third birthday and its cousin, the Protect, was released to considerable fanfare in October. The question for Google, of course, is ‘how is Nest really worth?’ I use one at my house, and I think it’s gorgeous and smart – but $3.2 billion? That’s why I was interested to check out this article over at Postscapes.com about an open source […]

HBR: Internet Of Things Has ‘Profound’ Impact On Risk

HBR: Internet Of Things Has ‘Profound’ Impact On Risk

The advent of a global network of Internet connected devices – sometimes referred to as the “Internet of Things” will bring about a “data democratization” that will upend traditional IT security models and pose considerable risks for organizations.   That’s the conclusion of two leading authorities on the so-called “Internet of Things” (IoT), Christopher J. Rezendes and W. David Stephenson, who write that its impact on businesses will be “profound,” and that cyber security will be one of the biggest challenges that organizations must address. In a guest post on the Harvard Business Review blog on Friday, Rezendes, the president of INEX Advisors, and Stephenson, an author and consultant specializing in the Internet of Things argue that  “the very principle that makes the IoT so powerful — the potential to share data instantly with everyone and everything (every authorized entity, that is) — creates a huge cybersecurity threat.” The authors predict […]