{"id":58646,"date":"2025-10-22T13:12:20","date_gmt":"2025-10-22T11:12:20","guid":{"rendered":"https:\/\/abacusgroup.io\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/"},"modified":"2026-05-13T17:35:21","modified_gmt":"2026-05-13T15:35:21","slug":"cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems","status":"publish","type":"post","link":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/","title":{"rendered":"Cybersecurity in the IoT era: protecting increasingly distributed systems"},"content":{"rendered":"\r\n\r\n  <div class=\"a-anchor\" id=\"introduction\"><\/div>\r\n\r\n<div class=\"section block-case-study-menu pb-0 boxed\" style=\"\" blockID=\"block_614c7da2a7562f6dc903baf4e6b46c37\">\r\n  <div class=\"container\">\r\n    <div class=\"row\">\r\n              <div class=\"col-12 col-lg-3\">\r\n          <div class=\"sidebar-container js-sidebar\">\r\n            <div class=\"card\">\r\n              <div class=\"card-body\">\r\n                <div class=\"accordion-item\">\r\n                  <div class=\"accordion-header\">\r\n                    <div \r\n                      class=\"accordion-button\" \r\n                      data-bs-target=\"#collapse_sidebar_block_614c7da2a7562f6dc903baf4e6b46c37\" \r\n                      data-controls=\"collapse_sidebar_block_614c7da2a7562f6dc903baf4e6b46c37\"\r\n                    >\r\n                      On this page                    <\/div>\r\n                  <\/div>\r\n                  <div id=\"collapse_sidebar_block_614c7da2a7562f6dc903baf4e6b46c37\" class=\"accordion-collapse collapse show\">\r\n                    <div class=\"accordion-body\">\r\n                      <ul class=\"list-group\">\r\n                                                  \r\n                          <li>\r\n                            <a href=\"#introduction\">\r\n                              Introduction                            <\/a>\r\n                          <\/li>\r\n\r\n                                                  \r\n                          <li>\r\n                            <a href=\"#context\">\r\n                              The context                            <\/a>\r\n                          <\/li>\r\n\r\n                                                  \r\n                          <li>\r\n                            <a href=\"#what_works\">\r\n                              What works                            <\/a>\r\n                          <\/li>\r\n\r\n                                                  \r\n                          <li>\r\n                            <a href=\"#approach\">\r\n                              Abacus approach                            <\/a>\r\n                          <\/li>\r\n\r\n                                                  \r\n                          <li>\r\n                            <a href=\"#case_study\">\r\n                              Case study                            <\/a>\r\n                          <\/li>\r\n\r\n                                                  \r\n                          <li>\r\n                            <a href=\"#contacts\">\r\n                              Contacts                            <\/a>\r\n                          <\/li>\r\n\r\n                                              <\/ul>\r\n                    <\/div>\r\n                  <\/div>\r\n                <\/div>\r\n              <\/div>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n      \r\n      <div class=\"col-12 col-lg-8 offset-lg-1\">\r\n        \r\n        <div class=\"section-title\">\r\n          \r\n                      <h3>Introduction<\/h3>\r\n<h4>The Internet of Things is rapidly expanding the digital perimeter of companies.<\/h4>                  <\/div>\r\n\r\n        <div class=\"row\">\r\n          <div class=\"col-12 \">\r\n                          <div class=\"text\">\r\n                <p><span style=\"font-weight: 400;\">But more devices means more vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In Italy, <strong>more than 50 million IoT devices are already active<\/strong>, with steady growth and a significant increase in cyber risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The point is no longer to connect systems.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The point is to <\/span><b>protecting them in a continuous and structured way<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n              <\/div>\r\n            \r\n            \r\n            \r\n            \r\n                      <\/div>\r\n        <\/div>\r\n      <\/div>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n\n  <div class=\"a-anchor\" id=\"context\"><\/div>\n\n<div class=\"section pb-0 boxed-small\" style=\"\" blockID=\"block_0bab38a65853a16d43b3c31a573e9296\">\n  <div class=\"container container-small\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <div class=\"section-title\">\n          \n                      <h3>The context: what&#8217;s going on<\/h3>                  <\/div>\n\n                  <div class=\"text\">\n            <p><span style=\"font-weight: 400;\">The <strong>spread of IoT<\/strong> is transforming several industries:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manufacturing<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Healthcare<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Smart cities<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">But this growth brings with it <strong>increased risks<\/strong>:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Increasingly frequent and sophisticated attacks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Increased exposure of infrastructure<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Growing complexity of ecosystems<\/span><\/li>\n<\/ul>\n<p>The cost of IoT attacks in Italy reached \u20ac1.7 billion in 2023.<\/p>\n          <\/div>\n        \n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n  <div class=\"a-anchor\" id=\"text_image_2\"><\/div>\n\n<div class=\"section block-2-columns block-2-columns-text-and-image pb-0 boxed-small\" style=\"\" blockID=\"block_f9e44a16f26d11470bd44836b72caab1\">\n  <div class=\"container container-small\">\n    <div class=\"row align-items-center\">\n      <div class=\"col-12 col-lg-6 order-lg-2\">\n        <div class=\"section-title\">\n          \n                      <h3>Where problems arise<\/h3>                  <\/div>\n\n                  <div class=\"text\">\n            <p><span style=\"font-weight: 400;\">The main critical issues are structural:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Extended attack surface<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">millions of connected devices<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Legacy systems integrated with IoT<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">introduction of new vulnerabilities<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Complex ecosystems<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Multiple vendors, platforms, and protocols<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance and governance<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">need for continuous monitoring of data<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">More than 60 percent of IoT devices do not have adequate security standards.<\/span><\/p>\n          <\/div>\n        \n              <\/div>\n\n      <div class=\"col-12 col-lg-6 order-lg-1\">\n                  <div class=\"image-container\">\n            <img decoding=\"async\" src=\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/img-cy4-copia-1.webp\" alt=\"Cybersecurity insighht abacus group\" class=\"img-fluid w-100\">\n          <\/div>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n\n<div class=\"section block-2-columns block-2-columns-text-and-image pb-0 boxed-small\" style=\"\" blockID=\"block_a8275725c1e2ac783d23c813bb913041\">\n  <div class=\"container container-small\">\n    <div class=\"row align-items-center\">\n      <div class=\"col-12 col-lg-6\">\n        <div class=\"section-title\">\n          \n                      <h3>Where you are investing<\/h3>                  <\/div>\n\n                  <div class=\"text\">\n            <p><span style=\"font-weight: 400;\">Companies are <strong>focusing investments<\/strong> on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Endpoint protection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Segmentation of networks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Re<\/span><span style=\"font-weight: 400;\">AI-based threat detection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Zero Trust architectures<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">More and more organizations are also <strong>adopting<\/strong>:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuous monitoring systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proactive security models<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrated governance framework<\/span><\/li>\n<\/ul>\n          <\/div>\n        \n              <\/div>\n\n      <div class=\"col-12 col-lg-6\">\n                  <div class=\"image-container\">\n            <img decoding=\"async\" src=\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/cybersecurity.iot_.jpg\" alt=\"Cybersecurity insighht abacus group\" class=\"img-fluid w-100\">\n          <\/div>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n  <div class=\"a-anchor\" id=\"what_works\"><\/div>\n\n<div class=\"section block-2-columns block-2-columns-text-and-image pb-0 boxed-small\" style=\"\" blockID=\"block_d56a10cc49b332509362def4c9e0aed7\">\n  <div class=\"container container-small\">\n    <div class=\"row align-items-center\">\n      <div class=\"col-12 col-lg-6 order-lg-2\">\n        <div class=\"section-title\">\n          \n                      <h3>What really works<\/h3>                  <\/div>\n\n                  <div class=\"text\">\n            <p><span style=\"font-weight: 400;\">The <strong>most effective strategies<\/strong> take a systems approach:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security designed at the architecture level<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuous threat monitoring<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integration between security and operations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Centralized governance management<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In summary: <\/span><b>security is not a layer; it is part of the system.<\/b><\/p>\n          <\/div>\n        \n              <\/div>\n\n      <div class=\"col-12 col-lg-6 order-lg-1\">\n                  <div class=\"image-container\">\n            <img decoding=\"async\" src=\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/cybersecurity-abacys.jpg\" alt=\"Cybersecurity insighht abacus group\" class=\"img-fluid w-100\">\n          <\/div>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n  <div class=\"a-anchor\" id=\"approach\"><\/div>\n\n<div class=\"section block-2-columns block-2-columns-text-and-image pb-0 boxed-small\" style=\"\" blockID=\"block_1802875167453035f0a8712102876ad9\">\n  <div class=\"container container-small\">\n    <div class=\"row align-items-center\">\n      <div class=\"col-12 col-lg-6\">\n        <div class=\"section-title\">\n          \n                      <h3>Abacus approach<\/h3>                  <\/div>\n\n                  <div class=\"text\">\n            <p><span style=\"font-weight: 400;\"><strong>Abacus<\/strong> addresses IoT security as a component of infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Key areas:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk assessment<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">vulnerability identification<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security architecture<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">robust solution design<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Continuous monitoring<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">proactive threat detection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance and governance<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Alignment with GDPR and regulations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Incident response<br \/>\n<\/b>rapid vulnerability management<\/li>\n<\/ul>\n<h3>Expected Results.<\/h3>\n<p><span style=\"font-weight: 400;\">A <strong>structured approach to IoT cybersecurity<\/strong> enables:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reducing the risk of attacks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Increased operational resilience<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data and infrastructure protection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Increased customer and stakeholder trust<\/span><\/li>\n<\/ul>\n          <\/div>\n        \n              <\/div>\n\n      <div class=\"col-12 col-lg-6\">\n                  <div class=\"image-container\">\n            <img decoding=\"async\" src=\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/abacus-approccio-cybersecurity.jpg\" alt=\"Cybersecurity insighht abacus group\" class=\"img-fluid w-100\">\n          <\/div>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n  <div class=\"a-anchor\" id=\"case_study\"><\/div>\n\n<div class=\"section pb-0 boxed-small\" style=\"\" blockID=\"block_54c28bbfb4711f0cdf5cccc624b6be2d\">\n  <div class=\"container container-small\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <div class=\"section-title\">\n          \n                      <h3>Case Study<\/h3>                  <\/div>\n\n                  <div class=\"text\">\n            <p><b>Background<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Organizations with complex and distributed IoT ecosystems<\/span><\/p>\n<p><b>Challenge<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Protect devices, data and infrastructure in heterogeneous environments<\/span><\/p>\n<p><b>Solution<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">network segmentation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">continuous monitoring<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">AI-driven sensing systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Zero Trust framework<\/span><\/li>\n<\/ul>\n<p><b>Results<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">reduction of vulnerabilities<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">greater operational control<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">improvement of overall safety<\/span><\/li>\n<\/ul>\n          <\/div>\n        \n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\r\n<div class=\"section block-list-locations has-card-download boxed-small\" style=\"\" blockID=\"block_f373da4134226df21c7084cf9fed03c0\">\r\n  <div class=\"container container-small\">\r\n    <div class=\"row\">\r\n      <div class=\"col-12\">\r\n        <div class=\"section-title\">\r\n          \r\n                      <h3 class=\"mb-4\">Download<\/h3>\r\n<h4>Download the full version of the insight.<\/h4>                  <\/div>\r\n\r\n        \r\n                  <div class=\"content-container mt-0\">\r\n            <div class=\"row\">\r\n\r\n              \r\n                <div class=\"col-12\">\r\n                  <div class=\"card card-locations\">\r\n                    <div class=\"card-bg\" style=\"background-image:url(https:\/\/abacusgroup.io\/wp-content\/uploads\/2026\/04\/mockup-cover-pdf-downloads.webp);\"><\/div>\r\n\r\n                                          <div class=\"card-body\">\r\n                                                  <h4>Cybersecurity in the IoT era: protecting increasingly distributed systems<\/h4>\r\n                        \r\n                        <div class=\"row align-items-end g-0\">\r\n                          <div class=\"col-12 col-md\">\r\n                                                          <div class=\"text\">\r\n                                <p>Full Insight<\/p>\n                              <\/div>\r\n                                                      <\/div>\r\n                                                      <div class=\"col-12 col-md-auto text-md-end\">\r\n                              <a href=\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2026\/04\/Abacus-Insight-Cybersecurity-nellera-dellIoT.pdf\" title=\"\" class=\"btn btn-grey\" target=\"\">\r\n                                Download PDF                              <\/a>\r\n                            <\/div>\r\n                                                  <\/div>\r\n                      <\/div>\r\n                                      <\/div>\r\n                <\/div>\r\n\r\n              \r\n            <\/div>\r\n\r\n          <\/div>\r\n        \r\n              <\/div>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n\n\n<div class=\"section pb-0 boxed-small\" style=\"\" blockID=\"block_883c8ebecc87717fb1b5089f7395c97f\">\n  <div class=\"container container-small\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <div class=\"section-title\">\n          \n                  <\/div>\n\n        \n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n\n<div class=\"section block-2-columns pb-0 boxed-small bg-grey\" style=\"\" blockID=\"block_67717f6b3125bc1630f37b97e1438d06\">\n  <div class=\"container container-small\">\n    \n    <div class=\"row \">\n      <div class=\"col-12 col-lg-3\">\n        <div class=\"section-title\">\n          \n                          <div class=\"pre-title mb-0\">\n                RELATED              <\/div>\n            \n                  <\/div>\n      <\/div>\n\n      <div class=\"col-12 col-lg-9\">\n                  <div class=\"section-title\">\n            <h3>Related Insight<\/h3><h4 class=\"mb-0\">Learn about other Abacus insights related to the topics of AI, ICT and business technology evolution.<\/h4>          <\/div>\n                \n        \n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n\n<div class=\"section block-list-cards has-cards-capability boxed-small bg-grey\" style=\"\" blockID=\"block_ae05947c7c8145f486b6eb6bac67f20c\">\n  <div class=\"container container-small\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <div class=\"section-title\">\n          \n                  <\/div>\n\n        \n        \n                  <div class=\"content-container mt-0\">\n            <div class=\"row\">\n\n              \n                <div class=\"col-12 col-lg-6\">\n                                      <a href=\"https:\/\/abacusgroup.io\/en\/2025\/10\/lai-nellict-dare-potere-alle-imprese-italiane-per-il-futuro\/\" title=\"\" class=\"d-block\" target=\"\">\n                  \n                  <div class=\"card card-link \">\n                                        \n                    <div class=\"card-bg\" style=\"background-image:url(https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-ai-insight.webp);\">\n                                              <h4 class=\"is-relative\">AI <br>in ICT<\/br><\/h4>\n                      \n                                              <div class=\"text\">\n                          <p>From market growth to operational challenges: what Italian companies really need to turn AI into concrete value.<\/p>\n                        <\/div>\n                      \n                                          <\/div>\n                    \n                    \n                                      <\/div>\n\n                                      <\/a>\n                                  <\/div>\n\n              \n                <div class=\"col-12 col-lg-6\">\n                                      <a href=\"https:\/\/abacusgroup.io\/en\/2025\/10\/integrazione-tra-cloud-computing-ed-edge-technology\/\" title=\"\" class=\"d-block\" target=\"\">\n                  \n                  <div class=\"card card-link \">\n                                        \n                    <div class=\"card-bg\" style=\"background-image:url(https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cloud-insight.webp);\">\n                                              <h4 class=\"is-relative\">Cloud <br>and Edge<\/br><\/h4>\n                      \n                                              <div class=\"text\">\n                          <p><span style=\"font-weight: 400;\">Scalability and control: because cloud and edge are components of a single operational architecture.<\/span><\/p>\n                        <\/div>\n                      \n                                          <\/div>\n                    \n                    \n                                      <\/div>\n\n                                      <\/a>\n                                  <\/div>\n\n              \n                <div class=\"col-12 col-lg-6\">\n                                      <a href=\"https:\/\/abacusgroup.io\/en\/2025\/10\/lesperienza-cliente-guidata-dallai-ridefinire-il-successo-aziendale\/\" title=\"\" class=\"d-block\" target=\"\">\n                  \n                  <div class=\"card card-link \">\n                                        \n                    <div class=\"card-bg\" style=\"background-image:url(https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-ai-driven-insight.webp);\">\n                                              <h4 class=\"is-relative\">Customer Experience <br>and AI<\/br><\/h4>\n                      \n                                              <div class=\"text\">\n                          <p><span style=\"font-weight: 400;\">How AI is transforming customer management and what it really takes to scale personalized, reliable and sustainable experiences.<\/span><\/p>\n                        <\/div>\n                      \n                                          <\/div>\n                    \n                    \n                                      <\/div>\n\n                                      <\/a>\n                                  <\/div>\n\n              \n            <\/div>\n          <\/div>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n\n\n  <div class=\"a-anchor\" id=\"contacts\"><\/div>\n\n<div class=\"section text-center text-white boxed-small\" style=\"background-image: url(https:\/\/abacusgroup.io\/wp-content\/uploads\/2026\/04\/bg-discover-leadership.webp)\" blockID=\"block_25f4e07f7d80ed660dce355b26021227\">\n  <div class=\"container container-small\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <div class=\"section-title\">\n          \n                      <h3>Do you want to strengthen the security of your IoT systems?<\/h3>\r\n<h4 class=\"mb-0\">Let&#8217;s talk about your needs and build a concrete approach.<\/br><\/br><\/h4>                  <\/div>\n\n        \n                  <div class=\"buttons-group\">\n                          <a href=\"https:\/\/abacusgroup.io\/en\/contacts\/\" title=\"\" class=\"btn btn-white\" target=\"\">\n                Contact us              <\/a>\n            \n                      <\/div>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>From exponential device growth to new attack surfaces: how to build security, governance, and operational resilience.<\/p>\n","protected":false},"author":1,"featured_media":58647,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3169],"tags":[],"ocean-capabilities":[],"class_list":["post-58646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-abacus"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity for businesses | Abacus Group<\/title>\n<meta name=\"description\" content=\"Cybersecurity in the IoT era for Italy&#039;s digital future: key points, trends and advice from Abacus experts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for businesses | Abacus Group\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity in the IoT era for Italy&#039;s digital future: key points, trends and advice from Abacus experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Abacus Group\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-22T11:12:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-13T15:35:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2880\" \/>\n\t<meta property=\"og:image:height\" content=\"1048\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vale0Studio0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/\"},\"author\":{\"name\":\"Vale0Studio0\",\"@id\":\"https:\/\/abacusgroup.io\/en\/#\/schema\/person\/78108bf36c2d4d915437e2a764b23c5b\"},\"headline\":\"Cybersecurity in the IoT era: protecting increasingly distributed systems\",\"datePublished\":\"2025-10-22T11:12:20+00:00\",\"dateModified\":\"2026-05-13T15:35:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/\"},\"wordCount\":9,\"image\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp\",\"articleSection\":[\"Insights Abacus\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/\",\"url\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/\",\"name\":\"Cybersecurity for businesses | Abacus Group\",\"isPartOf\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp\",\"datePublished\":\"2025-10-22T11:12:20+00:00\",\"dateModified\":\"2026-05-13T15:35:21+00:00\",\"author\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/#\/schema\/person\/78108bf36c2d4d915437e2a764b23c5b\"},\"description\":\"Cybersecurity in the IoT era for Italy's digital future: key points, trends and advice from Abacus experts.\",\"breadcrumb\":{\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage\",\"url\":\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp\",\"contentUrl\":\"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp\",\"width\":2880,\"height\":1048},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/abacusgroup.io\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in the IoT era: protecting increasingly distributed systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/abacusgroup.io\/en\/#website\",\"url\":\"https:\/\/abacusgroup.io\/en\/\",\"name\":\"Abacus Group\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/abacusgroup.io\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity for businesses | Abacus Group","description":"Cybersecurity in the IoT era for Italy's digital future: key points, trends and advice from Abacus experts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity for businesses | Abacus Group","og_description":"Cybersecurity in the IoT era for Italy's digital future: key points, trends and advice from Abacus experts.","og_url":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/","og_site_name":"Abacus Group","article_published_time":"2025-10-22T11:12:20+00:00","article_modified_time":"2026-05-13T15:35:21+00:00","og_image":[{"width":2880,"height":1048,"url":"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vale0Studio0","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#article","isPartOf":{"@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/"},"author":{"name":"Vale0Studio0","@id":"https:\/\/abacusgroup.io\/en\/#\/schema\/person\/78108bf36c2d4d915437e2a764b23c5b"},"headline":"Cybersecurity in the IoT era: protecting increasingly distributed systems","datePublished":"2025-10-22T11:12:20+00:00","dateModified":"2026-05-13T15:35:21+00:00","mainEntityOfPage":{"@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/"},"wordCount":9,"image":{"@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp","articleSection":["Insights Abacus"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/","url":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/","name":"Cybersecurity for businesses | Abacus Group","isPartOf":{"@id":"https:\/\/abacusgroup.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage"},"image":{"@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp","datePublished":"2025-10-22T11:12:20+00:00","dateModified":"2026-05-13T15:35:21+00:00","author":{"@id":"https:\/\/abacusgroup.io\/en\/#\/schema\/person\/78108bf36c2d4d915437e2a764b23c5b"},"description":"Cybersecurity in the IoT era for Italy's digital future: key points, trends and advice from Abacus experts.","breadcrumb":{"@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#primaryimage","url":"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp","contentUrl":"https:\/\/abacusgroup.io\/wp-content\/uploads\/2025\/10\/bg-hero-cyber-insight.webp","width":2880,"height":1048},{"@type":"BreadcrumbList","@id":"https:\/\/abacusgroup.io\/en\/2025\/10\/cybersecurity-in-the-iot-era-protecting-increasingly-distributed-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/abacusgroup.io\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in the IoT era: protecting increasingly distributed systems"}]},{"@type":"WebSite","@id":"https:\/\/abacusgroup.io\/en\/#website","url":"https:\/\/abacusgroup.io\/en\/","name":"Abacus Group","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abacusgroup.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/posts\/58646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/comments?post=58646"}],"version-history":[{"count":3,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/posts\/58646\/revisions"}],"predecessor-version":[{"id":59333,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/posts\/58646\/revisions\/59333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/media\/58647"}],"wp:attachment":[{"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/media?parent=58646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/categories?post=58646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/tags?post=58646"},{"taxonomy":"ocean-capabilities","embeddable":true,"href":"https:\/\/abacusgroup.io\/en\/wp-json\/wp\/v2\/ocean-capabilities?post=58646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}