{"id":131377,"date":"2021-10-14T07:16:09","date_gmt":"2021-10-14T12:16:09","guid":{"rendered":"https:\/\/www.een.com\/?p=131377"},"modified":"2022-03-26T00:21:52","modified_gmt":"2022-03-26T05:21:52","slug":"real-words-or-buzzwords-iot-and-iot-native","status":"publish","type":"post","link":"https:\/\/www.een.com\/sv\/blog\/real-words-or-buzzwords-iot-and-iot-native\/","title":{"rendered":"Real Words or Buzzwords: IoT and IoT-Native"},"content":{"rendered":"\n<p>Keeping IoT devices from compromising the cybersecurity of physical security systems<\/p>\n\n\n\n<p><em>Editor\u2019s note: This is the 56th article in the \u201cReal Words or Buzzwords?\u201d series about how real words can become empty words and stifle technology progress.<\/em><\/p>\n\n\n\n<p>The Real Words or Buzzword series focuses on terms that \u2013 in the physical security industry \u2013 are commonly misused, misunderstood, incorrectly defined or aren\u2019t broadly enough known and thus don\u2019t shape our thinking in the ways they should.<\/p>\n\n\n\n<p>The term IoT is well-known and well-understood, because it simply means all the \u201cthings\u201d that are connected to the Internet that are not general purpose computing\/networking devices, but rather are purpose-built devices that operate autonomously without an Internet connection.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.securityinfowatch.com\/security-executives\/article\/21241995\/real-words-or-buzzwords-iot-and-iotnative\" target=\"_blank\" rel=\"noreferrer noopener\">Read the full article<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">In the News<\/h3>\n\n\n\n<p><em>Covered on these news sites. Click image to read more.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.securityinfowatch.com\/security-executives\/article\/21241995\/real-words-or-buzzwords-iot-and-iotnative\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"375\" height=\"60\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/07\/site_logo_red_on_black.png\" alt=\"site_logo_red_on_black\" class=\"wp-image-127758\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/07\/site_logo_red_on_black.png 375w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/07\/site_logo_red_on_black-300x48.png 300w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Keeping IoT devices from compromising the cybersecurity of physical security systems Editor\u2019s note: This is the 56th article in the \u201cReal Words or Buzzwords?\u201d series about how real words can &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/sv\/blog\/real-words-or-buzzwords-iot-and-iot-native\/\"> <span class=\"screen-reader-text\">Real Words or Buzzwords: IoT and IoT-Native<\/span> L\u00e4s mer &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":60934,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4139,4147,4823,4827,4829,4831","_relevanssi_noindex_reason":"","footnotes":""},"categories":[73],"tags":[],"class_list":["post-131377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/131377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/comments?post=131377"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/posts\/131377\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media\/60934"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/media?parent=131377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/categories?post=131377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/sv\/wp-json\/wp\/v2\/tags?post=131377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}