APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Threats in IoT/M2M and How to face it?

    IoT sector finally stepped into PKI (public key infrastructure) which is a mechanism for naming and distributing public encryption keys. PKI plays a crucial role in increasing IoT security.  

    Threats in IoT/M2M and How to face it?

    By

    Apac CIOOutlook | Thursday, January 01, 1970

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    The newfound capability of the Internet of things enables enterprises to create value in many new ways. This world of internet connected things, where humans interact with machines and machines talking to other machinery devices (M2M) are here to stay. In reality, M2M is viewed as a subdivision of IoT.

    It is an encompassing phenomenon that includes Machine-to-human communication (M2H), Radio frequency identification (RFI), Location-based services (LBS), Lab-on-a-chip sensor (LCS), augmented reality, robotics, and vehicular telematics. The adoption rate of IoT is increasing five times faster than the adoption of electricity and mobile devices.

    IoT sector finally stepped into PKI (public key infrastructure) which is a mechanism for naming and distributing public encryption keys. PKI plays a crucial role in increasing IoT security. This enables the secured exchange of data across the internet. Using PKI, sending or receiving of data can be easily validated. PKI deployments have jumped to 23 percent since 2015, and about 49 percent of IoT firms are partially encrypting data. The rate of hiring percentage of IoT specialists has also increased.

    For the protection of IoT users, Jerry Brown, the governor of California has signed first IoT security legislation into law which will be active by 2020. This legislation includes vital points like stopping unauthorized access, preventing unwanted modifications, and providing a unique password for every IoT devices. IoT devices not only share the information across the networks but also aid in financial transactions.

    Here, the concern is how the payments or even verifications of payments are done from one device to another. As most of the IoT communications are peer to peer(P2P), the best solution for such security concern is blockchain technology. Blockchain not only secures the transactions between the devices but also enables easy payments for automated services across the borders.

    There is no doubt that the Internet of Things is bringing drastic changes in the way the people live and work. Business organizations are considering IoT security very seriously, with more funds investing in the research and education institutions. Many innovations are being introduced daily, but simultaneously many threats are being created which is becoming a challenge for the organization. Organizations should be aware of every threat and need to get ahead of the game today to become successful tomorrow.

    See Also : Threat Management Comanies

    More in News

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Role of Blockchain in Fostering a Trust-Based Economy

    Role of Blockchain in Fostering a Trust-Based Economy

    Revolutionizing Healthcare Through 5G Technology

    Revolutionizing Healthcare Through 5G Technology

    The Journey Towards Smart City Development

    The Journey Towards Smart City Development

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/threats-in-iotm2m-and-how-to-face-it-nwid-5714.html