IoT vulnerabilities exist in all devices (smart phones, healthcare devices, connected cars, and more) and also in all the data that is flowing between the devices and IoT apps. Several articles on developerWorks explore these security vulnerabilities and discuss how developers can address them.
Last year, we published an article, “Combating IoT cyber threats,” which outlines many development best practices for developing secure IoT solutions.
This year, we published a 3-part series, “Design and build secure IoT solutions,” that provides techniques for securing all three architectural tiers or layers of an IoT application using Message Queuing Telemetry Transport (MQTT) and IBM Watson IoT Platform:
Also this year, we are publishing a 2-part series, “Build a secure IoT healthcare solution with Bluemix,” using the IBM Watson IoT Platform and IBM Integration Bus Healthcare Pack (Part 1 is out now, and Part 2 is coming soon).
Finally, in November of last year, the IBM Academy of Technology (AoT) live-streamed and recorded a THINK event called “Security & Internet of Things: A World of Possibilities!” They also broke down the individual presentations into a YouTube playlist, which included the following IBM Think Academy video that introduces security in today’s cloud, mobile, and IoT environments:
Is security your biggest concern in your IoT solutions?
- Explore the Internet of Things hub on developerWorks
- Engage in the conversation about IoT and security on Stack Overflow
- Find an answer about security in IBM Watson IoT Platform on dW Answers
- See what IBM Watson Internet of Things is all about
- Read more about Watson IoT Platform security in the product documentation