10 tips to minimize IoT security vulnerabilities
Here’s a handy list of tips that can help you avoid the most common mistakes that business IT pros make when bringing IoT devices onto enterprise networks.The Online Trust Alliance’s new list lays out 10 suggestions for using IoT tech in the enterprise without making the enterprise more vulnerable to security threats. The list centers on awareness and minimizing access to less-secure devices. Having a strong understanding of what devices are actually on the network, what they’re allowed to do, and how secure they are at the outset is key to a successful IoT security strategy.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Many of the big benefits of 5G, such as low latency and higher speed broadband, may not be that noticeable to consumers, analysts say.
Thanks to all who joined us for the Big Switch Networks 2018 Next-Gen Data Center Networking Report Webinar: Next-Gen Networking for Hybrid and Multi-Cloud.
It claims 50 of the Fortune 500 companies use Pivotal Cloud Foundry software.
The organization plans to focus on Kubernetes, Istio, and Envoy this year, but is not about chasing a shiny ball.
Huawei enhances its storage platform; Orange and Siemens partner on industrial IoT; Equinix completes $804 million acquisition of Metronode.
