Yes, the Public Sector Is Embracing IoT!

By Tim Larkins, director, market intelligence

Most analysts agree that by 2021, over 20 billion Internet-connected devices worldwide will make up a market for the Internet of Things (IoT) worth over $2.5 trillion. That means a huge market opportunity for vendors providing technology at every point — from the user device to the platform itself.

In a nutshell, IoT allows devices to link and exchange data. It’s not a discrete technology like business applications or infrastructure or even cybersecurity. It’s more like a wrapper around all other technologies and is comprised of five major elements:

  • The Edge: The devices, nodes and sensors actually collecting data
  • The Gateway: Either a physical device or software that allows data to flow from the edge to the platform
  • The IoT Platform: The operating environment, storage, computing power and development tools that receive data from the gateway
  • Software Applications: Programs that let users solve business problems, working with data stored in the IoT platform
  • Cybersecurity: The tools that protect all the nodes/sensors/devices at the edge and data transmitted through the gateway, platform, all the way to the user

Read more of this post

New DOE Office to Focus on Cyber Threats to Energy Sector

Tom O'Keefe

By Tom O’Keefe, consultant

Facing mounting cybersecurity challenges, the Department of Energy recently created a new office, the Office of Cybersecurity, Energy Security, and Emergency Response (CESER). Karen Evans, a long-term fixture in cybersecurity in the federal government, was confirmed to lead the office on September 4, 2018. Dedicated to shoring up the cybersecurity of the U.S. energy grid, as well as protecting its own IT assets, the formation of CESER yet again demonstrates the government’s focus on protecting critical infrastructure from foreign attacks.

There are opportunities for industry within CESER, although it’s not your typical cyber play, like protecting against malware and viruses; it’s more about threat intelligence, information sharing and cyber situational awareness. Read more of this post

%d bloggers like this: