By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More

TDWI Articles

Data Digest: Integrating IoT Solutions, Securing Data Lakes, Testing IoT Vulnerabilities

Determine how well a new IoT solution or tool will integrate into your system, secure your data lake from the start, and check your system for vulnerable IoT devices.

Planning Ahead with IoT

IoT devices have been causing security headaches, but another big issue with IoT is integration. Your enterprise needs to know how any new IoT solution will integrate with your other systems; this article provides four questions to ask.

Read more at Readwrite


Best Practices for Securing Data Lakes

This article explains the importance of protecting your data lake and how to do so.

Read more at icrunchdata.com


How to Check if Your IoT Device is Vulnerable

A recent massive DDoS attack exploited a multitude of unsecured IoT devices. This article offers a few simple steps to quickly check if your connected device is vulnerable.

Read more at Computer World



About the Author

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.


TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.