Internet of Things: 2017 Predictions

In Predictions 2017: Security and Skills Will Temper Growth of IoT, Forrester argues that the IoT potential to fuel business growth is accompanied by multifaceted complexity. Here are the research firm’s specific predictions for next year:

IoT will be distributed across edge and cloud, boosted by AI and containers

IoT software will be distributed across edge devices, gateways, and cloud services. IoT solutions will be built on modern micro-services and containers that work across this distributed architecture. In addition, AI and machine-learning cloud services will increasingly be used to mine the data coming from IoT devices.

We will see the first prototypes of smart contracts built on blockchain

Researchers have been exploring how to enable reliable autonomous financial transactions, using blockchain technology to ensure distributed transactions. The first real-world experiments will be launched on 2017.

Vendors will offer a dizzying array of wireless tech to support IoT field use cases

Various characteristics of IoT devices such as small bursty traffic, dense sets of connections, or long distances require new forms of wireless connections, such as LoRaWAN, Sigfox, or 3GPP’s narrowband (NB)-IoT. For IoT decision-makers, there will be more than 20 wireless connectivity options and protocols to evaluate.

There will be a large-scale IoT security breach

The areas where IoT has been rapidly adopted are the most vulnerable, e.g., fleet management in transportation, security and surveillance applications in government, inventory and warehouse management applications in retail, and industrial asset management in primary manufacturing.

Forbes

 

« Cant Be Bothered: Non-Security Policy Used By 90% Of Workers
CyberXchange Conference 2016 »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

SixThirty CYBER

SixThirty CYBER

SixThirty is a venture fund that invests in early-stage enterprise technology companies from around the world building FinTech, InsurTech, and Cybersecurity solutions.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.

Mitigata

Mitigata

Welcome to Mitigata, your premier partner in cybersecurity insurance, defence, compliance, and consultancy.