Prototyping IoT with InfluxDB Cloud 2.0

Earlier this week we announced that we are ready for the world to start using InfluxDB Cloud 2.0, the next version of the most popular time series database, in production. I love InfluxDB, and joined the company because it is so easy and fun to use while also being a battle-hardened production database. InfluxDB Cloud 2.0 is suitable for monitoring infrastructure (including easily monitoring your Kubernetes cluster) but is also very popular for IoT projects.


What Is the ISA/IEC 62443 Framework?

Cybersecurity threats to manufacturing and process plants are coming from a wide range of attack vectors including supply chain, logistics, enterprise computing, remote connections, operator stations, programmable logic controllers, distributed control systems (DCSs), smart sensors and new smart devices. Many emerging Internet of Things (IoT) and communications technologies offer greater connectivity, but they make the cyber landscape more complex.


Building Serverless IoT Systems from Node-RED to AWS Lambda

Internet of Things, a term coined by the British technology pioneer Kevin Ashton, back in 1999 has now become one of the hottest topics in tech. However, 20 years have since passed and considering the rate of change in the world of technology, the current state of IoT’s mass acceptance is quite dismal.


Security Strategies for Mitigating IoT Botnet Threats

As DevSecOps continues to redefine the IT security landscape, security is becoming everyone’s responsibility. That means that staying ahead of the latest cybersecurity threats—such as IoT botnets—should be a priority for every DevOps professional. To help you do that, this article discusses strategies for combating IoT botnets.


Evolution of Data Management: The Role of Streaming Data and IoT Data Architecture

Guest author Ronda Swaney Gartner has predicted that there will be 20.4 billion connected things in existence by 2020. Those things range from Internet of Things (IoT) sensors on manufacturing equipment, to smart electric meters attached to homes, to continuous glucose monitors worn by people with diabetes. As the sources and speed of data capture grow, data management must evolve to keep up. But as data management evolves, what role will streaming data and IoT data architecture play?


Protecting Modern IoMT Against Cybersecurity Challenges

Even though the healthcare industry has been slower to adopt Internet of Things technologies than other industries, the Internet of Medical Things (IoMT) is destined to transform how we keep people safe and healthy, especially as the demand for lowering healthcare costs increases. The Internet of Medical Things refers to the connected system of medical devices and applications that collect data that is then provided to healthcare IT systems through online computer networks.


IoT Devices - Why Risk Assessment is Critical to Cybersecurity

As technology continues to pervade modern-day society, security and trust have become significant concerns. This is particularly due to the plethora of cyber attacks that target organizations, governments and society. The traditional approach to address such challenges has been to conduct cybersecurity risk assessments that seek to identify critical assets, the threats they face, the likelihood of a successful attack and the harm that may be caused.


Protecting your home from physical and cyber attacks

By 2025, it is estimated that there will be over 64 billion IoT devices around the world, with an increasing number being used around the home by mainstream consumers. Although these devices offer convenience and ease, homeowners need to be responsible for ensuring their security and safe upkeep. In the same way that homeowners add security systems to protect the physical aspects of a property, taking steps to improve the security of IoT devices will keep connected smart systems safe from attack.