{"id":735,"date":"2021-01-14T17:41:00","date_gmt":"2021-01-14T22:41:00","guid":{"rendered":"http:\/\/www.vernonchilders.com\/?p=735"},"modified":"2021-04-08T13:36:51","modified_gmt":"2021-04-08T17:36:51","slug":"10-iot-security-challenges-giuliano-liguori","status":"publish","type":"post","link":"https:\/\/www.vernchilders.com\/index.php\/2021\/01\/14\/10-iot-security-challenges-giuliano-liguori\/","title":{"rendered":"10 IoT Security Challenges &#8211; Giuliano Liguori"},"content":{"rendered":"\n<p>Turning to <a href=\"https:\/\/twitter.com\/hashtag\/IoT?src=hashtag_click\">#IoT<\/a> improves your efficiency while increasing your risk. This infographic looks at the challenges involved and how you can prepare for them. <a href=\"https:\/\/twitter.com\/hashtag\/Cybersecurity?src=hashtag_click\">#Cybersecurity<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Manufacturing?src=hashtag_click\">#Manufacturing<\/a><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Infographic?src=hash&amp;ref_src=twsrc%5Etfw\">#Infographic<\/a>: 19 <a href=\"https:\/\/twitter.com\/hashtag\/IoT?src=hash&amp;ref_src=twsrc%5Etfw\">#IoT<\/a> Security Challenges. <a href=\"https:\/\/twitter.com\/techment?ref_src=twsrc%5Etfw\">@techment<\/a> via <a href=\"https:\/\/twitter.com\/ingliguori?ref_src=twsrc%5Etfw\">@ingliguori<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/DigitalTransformation?src=hash&amp;ref_src=twsrc%5Etfw\">#DigitalTransformation<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Cloud?src=hash&amp;ref_src=twsrc%5Etfw\">#Cloud<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/MachineLearning?src=hash&amp;ref_src=twsrc%5Etfw\">#MachineLearning<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/BigData?src=hash&amp;ref_src=twsrc%5Etfw\">#BigData<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/ArtificialIntelligence?src=hash&amp;ref_src=twsrc%5Etfw\">#ArtificialIntelligence<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw\">#cybersecurity<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Blockchain?src=hash&amp;ref_src=twsrc%5Etfw\">#Blockchain<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/DX?src=hash&amp;ref_src=twsrc%5Etfw\">#DX<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Analytics?src=hash&amp;ref_src=twsrc%5Etfw\">#Analytics<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/AI?src=hash&amp;ref_src=twsrc%5Etfw\">#AI<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/IIoT?src=hash&amp;ref_src=twsrc%5Etfw\">#IIoT<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/DataScience?src=hash&amp;ref_src=twsrc%5Etfw\">#DataScience<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\">#infosec<\/a> <a href=\"https:\/\/twitter.com\/antgrasso?ref_src=twsrc%5Etfw\">@antgrasso<\/a> <a href=\"https:\/\/twitter.com\/mvollmer1?ref_src=twsrc%5Etfw\">@mvollmer1<\/a> <a href=\"https:\/\/twitter.com\/HaroldSinnott?ref_src=twsrc%5Etfw\">@HaroldSinnott<\/a> <a href=\"https:\/\/twitter.com\/Hana_ElSayyed?ref_src=twsrc%5Etfw\">@Hana_ElSayyed<\/a> <a href=\"https:\/\/twitter.com\/rvp?ref_src=twsrc%5Etfw\">@rvp<\/a> <a href=\"https:\/\/t.co\/OfNJxdokGm\">pic.twitter.com\/OfNJxdokGm<\/a><\/p>&mdash; Giuliano Liguori (@ingliguori) <a href=\"https:\/\/twitter.com\/ingliguori\/status\/1345781983146889216?ref_src=twsrc%5Etfw\">January 3, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Turning to #IoT improves your efficiency while increasing your risk. This infographic looks at the challenges involved and how you can prepare for them. #Cybersecurity #Manufacturing<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,7,5,8],"tags":[],"class_list":["post-735","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-internet-of-things","category-manufacturing","category-working-in-it"],"_links":{"self":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/comments?post=735"}],"version-history":[{"count":1,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/735\/revisions"}],"predecessor-version":[{"id":736,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/735\/revisions\/736"}],"wp:attachment":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/media?parent=735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/categories?post=735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/tags?post=735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}