Cybersecurity Shootout in the IoT Wild-Wild West

August 18, 2016 Rami Essaid

The data security landscape is scary enough as it is, and things are about to get much more intimidating for businesses. The emerging Internet of Things (IoT), in which countless objects will be connected via sensors and the Internet, is creating new opportunities for hackers and other bad actors to exploit systems and steal data or otherwise wreak havoc.

Among the key enablers of the IoT are the application programming interfaces (APIs) that will help connect devices, assets, products and other “things” to the Internet. And APIs present their own set of security vulnerabilities that organizations need to address to keep their own IoT environments as secure as possible.

This is no small task when you consider the projected scope of the IoT. Research firm Gartner Inc. in November 2015 estimated that some 6.4 billion connected things will be in use worldwide in 2016, up 30% from 2015. This year 5.5 million new things will get connected every day, Gartner says, and the total number of connected things is predicted to reach 20.8 billion by 2020.

Read the Article

About the Author

Rami Essaid

Rami Essaid is the Chief Product and Strategy Officer and Co-founder of Distil Networks, the first easy and accurate way to identify and police malicious website traffic, blocking 99.9% of bad bots without impacting legitimate users. With over 12 years in telecommunications, network security, and cloud infrastructure management, Rami continues to advise enterprise companies around the world, helping them embrace the cloud to improve their scalability and reliability while maintaining a high level of security.

Follow on Twitter More Content by Rami Essaid
Previous Article
65% of Windows devices still running Windows 7, released in 2009
65% of Windows devices still running Windows 7, released in 2009

Next Article
To Protect Enterprise Data, Secure the Code
To Protect Enterprise Data, Secure the Code

Responsibility for securing enterprise applications has been moving down the development lifecycle, and for...