Finding parking spots with Custom Vision and IoT

Finding parking spots with Custom Vision and IoT

As developers, we have the ability to use machine learning to our applications to create very unique experiences and solve difficult problems for our customers. In this episode, Martina and Bruno Capuano sit with Scott to show us how we can use Custom Vision and IoT devices to recognize objects in the real world. This…

HEMLIG DATAAVLÄSNING – ENCRO, SKY, och IoT – Du skulle bara veta ..

HEMLIG DATAAVLÄSNING – ENCRO, SKY, och IoT – Du skulle bara veta ..

VAD KAN INTERNET OF THINGS ha att göra med HEMLIG DATAAVLÄSNING? Du skulle bara veta! I denna del går vi igenom tekniken. Kommer man verkligen KUNNA avläsa krypterade appar och telefoner? Kommer man kunna ta sig in i superkrypterade telefoner som ENCRO och SKY? Är det BARA telefoner, ipads och datorer som kommer att utsättas…

End-to-end IoT device security with Azure Sphere | Azure Friday

End-to-end IoT device security with Azure Sphere | Azure Friday

Caitie McCaffrey joins Scott Hanselman to give a detailed overview of Azure Sphere, including how the hardware, operating system, and cloud-based security service work together to deliver end-to-end security for IoT devices. Azure Sphere is now generally available. A secure foundation for IoT, Azure Sphere now generally available https://aka.ms/azfr/615/01 Get started with Azure Sphere https://aka.ms/azfr/615/02…

Evolution of AIOps to Watch Over Smart City IoT

Evolution of AIOps to Watch Over Smart City IoT

Darren Bennett, Deputy Director, Chief Information Security Officer, City of San Diego Thomas Caldwell, CTO, Techniche In light industry including physical infrastructure, more smart devices are being connected to networks. Smart cities are abundant with sensors, video cameras and facility assets. Monitoring these assets for availability, performance and cybersecurity is a challenge. AIOps, including AI-Bots…

IoT Bug Hunting: From Shells to Responsible Disclosure

IoT Bug Hunting: From Shells to Responsible Disclosure

Shaun Mirani, Security Analyst, Independent Security Evaluators Ian Sindermann, Associate Security Analyst 2, Independent Security Evaluators Internet of things (IoT) have always been vulnerable. This study proved that security controls put in place by device manufacturers are insufficient against attacks carried out by remote adversaries. This talk will summarize some of the best stories from…

Next-Gen IoT Botnets 3: Bad Implementations of Good Cloud Platforms

Next-Gen IoT Botnets 3: Bad Implementations of Good Cloud Platforms

Alex Jay Balan, Chief Security Researcher, Bitdefender With most IoTs moving towards cloud platforms, it seemed appropriate to look at their implementations. And boy did the team hit “insecurity gold”! Authentication bypasses, device tampering and RCE. And the beauty of it is that it’s no longer needed to iterate the IP space and find open…

What’s in the Box? Software Bill of Materials for IoT

What’s in the Box? Software Bill of Materials for IoT

Dr. Allan Friedman, Director of Cybersecurity, NTIA / US Department of Commerce Devices are opaque—how do we trust them? In addition to security standards, transparency of SW components can be a key driver of trust and quality. This talk will share details on industry consensus around “software bill of materials” and present an initial playbook…

Building a Comprehensive IoT Security Testing Methodology

Building a Comprehensive IoT Security Testing Methodology

Deral Heiland, Research Lead, IoT, Rapid7 This presentation will focus on building an effective security testing methodologies for Internet of things (IoT) product ecosystems. IoT is multifaceted, requiring a well-defined and holistic approach in its testing. Learn why a structured and comprehensive testing program is needed in a discussion of the technical details, and challenges…

Consumer IoT Security: Creating a Baseline Standard

Consumer IoT Security: Creating a Baseline Standard

Jasper Pandza, Development Lead, UK Department for Digital, Culture, Media and Sport (DCMS) HMG will explain why standards and complementary regulation for consumer IoT security are needed. The presenter will provide an update on the UK’s international work, in terms of the steps taken to refine ETSI TS 103 645 and also setting out how…

How Stora Enso IoT Solution is Impacting Carbon Footprint and Sustainability

How Stora Enso IoT Solution is Impacting Carbon Footprint and Sustainability

Check out how Stora Enso makes RFID tags green (https://aka.ms/iotshow/storaenso) Enabling automated item level processes and bringing business and environmental benefits to the industries the RFID (Radio Frequency Identification) based solutions are getting their lost interest back step by step. In retail for example apparel industry and retailers are implementing RFID and driving related development.…