{"id":34908,"date":"2020-05-11T10:00:00","date_gmt":"2020-05-11T10:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/"},"modified":"2020-05-11T10:00:00","modified_gmt":"2020-05-11T10:00:00","slug":"the-internet-of-things-in-2020-more-vital-than-ever","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/","title":{"rendered":"The Internet of Things in 2020: More vital than ever"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/05\/tech_spotlight_iot_intro_by_-go-unlee_gettyimages_1174958392_thinkstock_178457492_3x2_2400x1600-100841136-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>If you work in IT, you\u2019re probably safely ensconced at home right now, clinging to your laptop at the edge of your company\u2019s network. The shift from office to home has been momentous. But it\u2019s also symbolic of a larger trend: The network edge has become as important as the network core. Remote workers aside, the <a href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\">IoT (internet of things)<\/a> is the biggest reason why the edge has become so crucial.<\/p>\n<p>According to Gartner, a crazy variety of some 21 billion connected \u201cthings\u201d are at this moment collecting data and performing all sorts of tasks. The majority are consumer devices, from smart speakers to watches to door locks. The rest serve business: medical devices, engine sensors, industrial robots, HVAC controllers\u2026almost every enterprise now relies on IoT devices in one form or another.<\/p>\n<aside class=\"sidebar medium\">\n<h3 class=\"body\">Tech Spotlight:<br \/><a href=\"https:\/\/www.networkworld.com\/article\/3542891\/the-internet-of-things-in-2020-more-vital-than-ever.html\">The internet of things<\/a><\/h3>\n<\/aside>\n<p>These devices vastly expand the reach of enterprise networks \u2013 and increase vulnerability proportionally, as the <a href=\"https:\/\/www.csoonline.com\/article\/3258748\/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html\">Mirai botnet attack<\/a> vividly illustrated. But with proper security in place, the payoff can be enormous, as connected devices transmit gobs of data from which analytics professionals can surface insights and accelerate business transformation. Not to mention that the ability to control devices remotely suits our troubled COVID-19 era, during which any sort of travel should be minimized.<\/p>\n<p>Today\u2019s growing multitude of IoT endpoints is tying the digital and physical worlds ever closer together, improving the accuracy of predictions and delivering event-driven messages that can be acted on without human intervention. To examine the impact of the IoT and provide implementation advice, Network World, Computerworld, CSO, CIO, and InfoWorld each bring their own view of the most pervasive trend in tech.<\/p>\n<h2><strong>Instrumenting the world<\/strong><\/h2>\n<p>At the moment, no more dramatic example of the IoT&#8217;s value exists than the medical device \u2013 such as <a href=\"https:\/\/www.networkworld.com\/article\/3539058\/iot-offers-a-way-to-track-covid-19-via-connected-thermometers.html\">Kinsa\u2019s connected thermometer<\/a>, from which the company is aggregating data to flag possible COVID-19 outbreaks.<\/p>\n<p>Writing for Computerworld, Senior Reporter Lucas Mearian observes that the IoT has already hit the medical mainstream in &#8220;<a href=\"http:\/\/www.computerworld.com\/article\/3529427\/how-iot-is-becoming-the-pulse-of-healthcare.html\">How IoT is becoming the pulse of healthcare<\/a>.&#8221; Not only have 79 percent of healthcare providers with revenue over $100 million put IoT devices into production, but Gartner predicts a 13-percent rise in medical IoT spending in the next fiscal year \u2013 and 75 percent of healthcare providers believe IoT projects will deliver financial payback within three years.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<p>The critical nature of IoT medical devices raises the security stakes exponentially, as this <a href=\"https:\/\/www.youtube.com\/embed\/rocaXEo4C7Y\" rel=\"nofollow\">Network World video<\/a>&nbsp;warns us. But as CSO contributor&nbsp;Jaikumar Vijayan writes in &#8220;<a href=\"https:\/\/www.csoonline.com\/article\/3538416\/how-iot-changes-your-threat-model-4-key-considerations.html\">How IoT changes your threat model: 4 key considerations<\/a>,&#8221; the risks around IoT in operational technology also loom large. Because IoT devices connect to the internet, they open new attack vectors that, say, core manufacturing operations never had to confront before. Companies need to develop enterprise-wide frameworks for IoT procurement, deployment, security, and monitoring to minimize that exposure.<\/p>\n<p>Yes, IoT security risks are serious&nbsp;\u2013 but so are the rewards, sometimes in unexpected places. In &#8220;<a href=\"https:\/\/www.networkworld.com\/article\/3541520\/iot-down-on-the-farm-drones-and-sensors-for-better-yields.html\">IoT down on the farm: Drones and sensors for better yields<\/a>,&#8221; Network World Senior Writer Jon Gold interviews three agricultural professionals who are using IoT devices to optimize their operations. In two of those cases, soil moisture sensors provide the data necessary to find a balance between adequate irrigation and water conservation, with potentially big cost savings.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p>To derive value from IoT data&nbsp;\u2013 the volume of which Cisco predicts will top 800 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zettabyte\" rel=\"nofollow\">zettabytes<\/a> by the end of 2021 \u2013 you need the right analytics tools and a coherent analytics strategy, which CIO contributor Bob Violino outlines in&nbsp;&#8220;<a href=\"https:\/\/www.networkworld.com\/article\/3541520\/iot-down-on-the-farm-drones-and-sensors-for-better-yields.html\">IoT analytics: Reaping value from IoT data<\/a>.&#8221; The basic elements include: Creating a discrete analytics organization; establishing a scalable IoT data architecture; deploying AI-based systems that autonomously act on IoT data; and using public cloud services for scale and reduced time to market.<\/p>\n<p>That latter point was underlined in Bob&#8217;s article by Greg Meyers, Group CIO and Chief Digital Officer for Syngenta, a company that produces seeds and agricultural chemicals. Meyers, who is bullish on running IoT analytics in the cloud, put it bluntly: \u201cTrying to manage it yourself in your own data center or on your own infrastructure is hugely self-defeating.\u201d<\/p>\n<p>For many enterprises, that cloud imperative applies not only to IoT analytics, but also to monitoring IoT endpoints and providing an environment for building IoT applications. In&nbsp;&#8220;<a href=\"https:\/\/www.infoworld.com\/article\/3539010\/how-to-choose-a-cloud-iot-platform.html\">How to choose a cloud IoT platform<\/a>,&#8221; InfoWorld Contributing Editor Martin Heller dives into a technical description of the benefits of cloud IoT \u2013 including those offered by serverless computing applications, which conserve pay-per-use cycles by running only when triggered by IoT data or events.<\/p>\n<p>Martin&#8217;s most emphatic point: Make sure you roll out a proof of concept first. &#8220;Plan for your first effort to fail so that you can learn from your mistakes and build it right the next time,&#8221; he says. That applies to pretty much any complex IT project, but when you&#8217;re on the network edge hatching a cutting-edge IoT scheme, it goes double.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<div class=\"end-note\">\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3542891\/the-internet-of-things-in-2020-more-vital-than-ever.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nIf you work in IT, you\u2019re probably safely ensconced at home right now, clinging to your laptop at the edge of your company\u2019s network. The shift from office to home has been momentous. But it\u2019s also symbolic of a larger trend: The network edge has become as important as the network core. Remote workers aside, the IoT (internet of things) is the biggest reason why the edge has become so crucial.According to Gartner, a crazy variety of some 21 billion connected \u201cthings\u201d are at this moment collecting data and performing all sorts of tasks. The majority are consumer devices, from smart speakers to watches to door locks. The rest serve business: medical devices, engine sensors, industrial robots, HVAC controllers\u2026almost every enterprise now relies on IoT devices in one form or another.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34909,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[8192,1253,3460,1625,376,95,762,307,1335],"class_list":["post-34908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-analytics","tag-cloud-computing","tag-connected-devices","tag-industrial-control-systems","tag-internet-of-things","tag-medical-devices","tag-networking","tag-security","tag-sensors"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Internet of Things in 2020: More vital than ever 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Internet of Things in 2020: More vital than ever 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-11T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Internet of Things in 2020: More vital than ever\",\"datePublished\":\"2020-05-11T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/\"},\"wordCount\":856,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg\",\"keywords\":[\"Analytics\",\"cloud computing\",\"Connected devices\",\"industrial control systems\",\"Internet of Things\",\"Medical Devices\",\"Networking\",\"Security\",\"Sensors\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/\",\"name\":\"The Internet of Things in 2020: More vital than ever 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg\",\"datePublished\":\"2020-05-11T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analytics\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/analytics\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Internet of Things in 2020: More vital than ever\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Internet of Things in 2020: More vital than ever 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/","og_locale":"en_US","og_type":"article","og_title":"The Internet of Things in 2020: More vital than ever 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-11T10:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Internet of Things in 2020: More vital than ever","datePublished":"2020-05-11T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/"},"wordCount":856,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg","keywords":["Analytics","cloud computing","Connected devices","industrial control systems","Internet of Things","Medical Devices","Networking","Security","Sensors"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/","url":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/","name":"The Internet of Things in 2020: More vital than ever 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg","datePublished":"2020-05-11T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/the-internet-of-things-in-2020-more-vital-than-ever.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-internet-of-things-in-2020-more-vital-than-ever\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Analytics","item":"https:\/\/www.threatshub.org\/blog\/tag\/analytics\/"},{"@type":"ListItem","position":3,"name":"The Internet of Things in 2020: More vital than ever"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34908"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34908\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34909"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}