Jane Porter

Jane Porter

Director Product Management, Cumulocity IoT Platform Services at Software AG

Recent posts

  • IoT

    Three Key IoT Cybersecurity Insights

    Co-authored by saran govindarajan The era of Smart Connect Products is turning every company into a software company. The ability to connect, manage, and monitor assets across the globe comes with the responsibility to collect and store data securely and prevent malicious actors from gaining control.  The primary theme that ties together our series on cybersecurity is that There is…

    Read More

  • IoT

    Six Cybersecurity Questions to Ask Your IoT Partners

    CO-AUTHORED BY SARAN GOVINDARAJAN Many of the topics we have addressed in our cybersecurity posts apply to a wide range of IT deployments. There are two main considerations that apply especially for Industrial IoT applications, from Smart Connected Products to Smart Cities. First, as the number of devices involved in a deployment scale and the volume of data grows exponentially, the…

    Read More

  • IoT

    Don’t Wait Until It’s Too Late: How to Build Security into IoT Apps from the Beginning

    Co-authored by saran govindarajan As we continue building cybersecurity into IoT deployments, the next area we want to consider are the challenges of creating your own applications. Let’s consider the approach most of us take when creating an application. The excitement of developing new applications that can address a customer’s problem is very motivating in the design process. Typically, the first…

    Read More

  • IoT

    Are you authorized to read this post?

    Building on our previous blog around authentication, we will now discuss the other side of the coin; and one that is often confused with authentication — authorization. Having proved that we are allowed to access the system, we now need to be allowed to access the various resources of the system. This is a more granular approach and allows the…

    Read More

  • IoT

    Authentication in Cybersecurity: Who do we think you are?

    We said in our last blog that we would cover authentication and authorization in this follow up — however we quickly realized there is a lot to talk about on both topics, so we have split them. This post will define authentication and authorization, and in our next post we will look at how best practices intersect to improve overall…

    Read More

  • IoT

    Building Defense in Depth

    In the first blog of this series, we talked about the fact that a layered approach to security is required to minimize the attack vector. With all the different ways hackers can access sensitive systems, multiple types of solutions need to be included at the user and administrative levels. There are many different approaches and standards to layered security and…

    Read More

  • IoT

    IoT in Cybersecurity: Where is the silver bullet?

    For everybody using Cloud-based services, security is a key concern. Each week we learn of another organization that has been successfully hacked, with sensitive corporate or personal data shared with malicious 3rd-parties or leaked to the Dark Web. According to CrowdStrike's 2022 Global Threat Report, the past year saw an 82% increase in incidents of data leaks caused by malware…

    Read More

  • IoT

    IoT data hoarding – are you guilty?

    Like the other “things” in life you can hoard, the Internet of Things (IoT) is a playground for IoT data hoarders. Many people are hoarders, whether it is clothes, gadgets, or - in the recent pandemic - toilet rolls. And if you do hoard a bit, you know that you should regularly clear out what you don’t need and are unlikely to…

    Read More

  • IoT

    IoT and the circular economy

    The Internet of Things (IoT) has an important role to play in the circular economy, by helping your business keep products in use in a way that makes money plus enhances the customer experience. Among the many challenges today, one of the most impactful is climate change. Every country is affected and has a part to play in changing their ways…

    Read More