https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Cybersecurity Protection Increasingly Depends on Machine Learning

Using machine learning to protect the proliferating landscape of IoT and edge devices will ultimately rely on a distributed network model that applies intelligence at different tiers, based on cost, bandwidth and availability.
  • 28th October 2020

Previously, computing power was centralized in the cloud or an on-premises data center. But many enterprise tasks require a decentralized model, where capabilities are brought closer to the devices and users that need these resources.

This need for low latency, data-rich digital capabilities is moving compute to the edge of the network. Computing power is distributed at the edge, fueling growth in data-driven intelligence among burgeoning numbers of Internet of Things (IoT) devices.

One downside to the rising popularity of edge computing is increasing infrastructure complexity. Protecting this extended infrastructure may ultimately depend on machine learning (ML) technologies to automate threat detection and response.

In this report, we explore the capabilities of machine learning for cybersecurity tasks.

Key takeaways from this special report include the following:

  • How machine learning algorithms can infer relationships and patterns of previously unseen activity to recognize network activity that indicates pending attacks.
  • While cyberattacks on IoT devices grow, CIOs and CISOs mistakenly assume they are required to purchase separate point solutions, build a separate IoT security team and change IT security processes to bring it all together, begging the question “is it possible to secure IoT devices without spending on additional infrastructure or upsetting the already established IT status quo?”
  • As organizations take advantage of emerging 5G connectivity to exploit more data from more devices, they must guard against the potential of bad actors hijacking ML-embedded devices and broadband capacity.

Brought to you by:

 

 

Tags: Security Business Resources White Papers Special Reports Sponsor Content

Related


  • PKI: The Solution for Designing Secure IoT Devices
    In the emerging Internet of Things (IoT) market, security risks continue to outpace innovation, as companies deploy billions of connected devices into business and life-critical systems. As more stringent security requirements and regulations come into effect, IoT product leaders must ensure their devices are protected against today’s threats, and future product and security lifecycle challenges. […]
  • Zero Trust Manufacturing: Navigating Complex Supply Chains to Build Trusted IoT Devices
    As manufacturing supply chains continue to get more complex, it has becoming increasingly difficult to build IoT that can be trusted by both the manufacturer and device owner. In this whitepaper, learn how a “zero trust” approach—designing security into devices while maintaining effective security controls throughout the process and product life cycle— ensures the safety […]
  • Facility of the Future
    Critical considerations for deploying smart, fast and flexible Life Sciences facilities
  • Cybersecurity Protection Increasingly Depends on Machine Learning
    IoT Security Best Practices for Industry and Enterprise
    Security has long been a worry for Internet of Things projects. By implementing IoT security best practices, however, risk can be minimized.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X