Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Tom's Tech Notes: IoT Security [Podcast]

DZone's Guide to

Tom's Tech Notes: IoT Security [Podcast]

Here's the state of IoT security and some best practices to consider, straight from the experts' mouths.

· IoT Zone ·
Free Resource

Download The Comparative Guide to Rules Engines for IoT to learn what are the most common automation technologies used in the IoT domain for application development

In case you didn't see it, we launched our new podcast —Tom's Tech Notes — last week. Our first five episodes were all about DevOps, but the next handful of discussions will revolve around IoT. To that end, we're starting off with one of the most important IoT topics out there: security.

As a primer and reminder from our initial post, these podcasts are compiled from conversations our analyst Tom Smith has had with industry experts from around the world as part of his work on our research guides.

In this episode, we'll hear advice from six of those experts about securing IoT systems, as well as pitfalls to avoid.


Today's interviewees are:

  • Adam Fingerman (CEO of ArcTouch)

  • David Bericat (Global Technical Lead, Industrial IoT and Edge Computing at Red Hat)

  • David McCall and Clarke Stevens (Open Connectivity Foundation)

  • Mike Donovan (VP of Product at Aquicore)

  • Ray Wu (CEO of Wynd)

  • Suzy Visvanathan (Director of Product Management at MapR)

And, as always, you can find our podcasts on:

See how CEP engines, stream processing engines, flow based programming engines and other popular rule-based technologies perform against seven IoT-specific criteria.

Topics:
iot ,iot security ,iiot ,toms tech notes ,podcast

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}