Internet of Things: 2017 Predictions

In Predictions 2017: Security and Skills Will Temper Growth of IoT, Forrester argues that the IoT potential to fuel business growth is accompanied by multifaceted complexity. Here are the research firm’s specific predictions for next year:

IoT will be distributed across edge and cloud, boosted by AI and containers

IoT software will be distributed across edge devices, gateways, and cloud services. IoT solutions will be built on modern micro-services and containers that work across this distributed architecture. In addition, AI and machine-learning cloud services will increasingly be used to mine the data coming from IoT devices.

We will see the first prototypes of smart contracts built on blockchain

Researchers have been exploring how to enable reliable autonomous financial transactions, using blockchain technology to ensure distributed transactions. The first real-world experiments will be launched on 2017.

Vendors will offer a dizzying array of wireless tech to support IoT field use cases

Various characteristics of IoT devices such as small bursty traffic, dense sets of connections, or long distances require new forms of wireless connections, such as LoRaWAN, Sigfox, or 3GPP’s narrowband (NB)-IoT. For IoT decision-makers, there will be more than 20 wireless connectivity options and protocols to evaluate.

There will be a large-scale IoT security breach

The areas where IoT has been rapidly adopted are the most vulnerable, e.g., fleet management in transportation, security and surveillance applications in government, inventory and warehouse management applications in retail, and industrial asset management in primary manufacturing.

Forbes

 

« Cant Be Bothered: Non-Security Policy Used By 90% Of Workers
CyberXchange Conference 2016 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ANS Group

ANS Group

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

ECOMPLY

ECOMPLY

ECOMPLY is an all-in-one GDPR Compliance Solution. Efficient data protection management system for businesses and DPOsomply.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Next Horizon

Next Horizon

In the Next Horizon incubator, new disruptive models are being developed in Industry 4.0, Automated Driving and Internet-of-Things.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

One82

One82

Serving emerging small and medium-sized businesses in California and neighboring regions for over 20 years, One82 has established itself as the most dependable provider of IT support services.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.