CW500 video: Douwe Mik, EY, on security and the IoT

Experts predict that adaptive and context-aware access control is a necessary next step for the identity and access management (IAM) industry, particularly in light of the need to enable machine-to-machine authentication in future as the internet of things takes off. What can businesses do to ensure their IAM and security systems are able to take a broader range of factors into consideration to determine that a person or thing is who or what they claim to be? In this CW500 Club video Douwe Mik, director of cyber security advisory services, EY talks to Computer Weekly editor in chief Bryan Glick about the security challenges of the internet of things.

View All Videos

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close