Despite the business-transforming upsides of data from the Internet of things (IoT), there’s a downside: security. Porous networks and lax users offer tantalizing access for hackers. Although most security spending is at the enterprise level, a shift is needed to secure IoT applications and provide improved governance and accountability. Electronics companies must create secure environments that safely collect, consume, share and store data on their networks. But they also must go beyond devices and consumers to close holes to factory, ecosystem and partner networks.

Experts on this topic

Tim Hahn

Tim Hahn
IBM Distinguished Engineer, Internet of Things Security,
IBM Master Inventor

Hiroshi Yamamoto

Hiroshi Yamamoto
IBM Distinguished Engineer, Global Electronics Industry CTO,
IBM Member of Academy of Technology

Read related IBV publications

Cost of data breach study

Cost of data breach study

Essential reports on today's security landscape

It's not where you start — it's how you finish

It's not where you start — it's how you finish

Addressing the cybersecurity skills gap with a new collar approach

2017 Study on Mobile and IoT Application Security

2017 Study on Mobile and IoT Application Security

Ponemon Institute 2017 Study on Mobile and Internet of Things Application Security sponsored by IBM and Arxan

Contact IBV

Want more information?