New Vulnerabilities and Safeguarding of IoT

The Internet of Things delivers new ways to create and capture business value, but also creates some frightening new vulnerabilities that organizations must take specific actions to address.

The rapidly expanding Internet of Things (IoT) is poised to generate huge volumes of data and deliver valuable business insights. But it also introduces substantial new risk.

A defining element of the Internet of Things (IoT) is that objects are not merely smart—equipped with sensors and processing power—but also connected: able to share the information they generate. More data, and more sensitive data, accessible across a broad network of interconnected stakeholders could pose significant dangers if compromised. As the World Economic Forum reported in March, “Hacking the location data on a car is merely an invasion of privacy, whereas hacking the control system of a car would be a threat to a life.” The rise of IoT requires enterprises to put in place systems to protect this new source of information-based value.

Organizations need to be Secure.Vigilant.Resilient.™ in order to effectively manage their enterprise cyber risks, and this paradigm also applies to IoT. By adopting a Secure.Vigilant.Resilient. approach, companies may address proliferating vulnerabilities and the rising sophistication of cyber attacks. This three-pronged, risk-based approach aims to focus organizations on their most important assets and invest in cost-justified security controls designed to protect them. It also emphasizes in equal measures a need to gain greater visibility into threats and to improve coordination of response efforts to reduce the impact of a cyber attack. Continue reading “New Vulnerabilities and Safeguarding of IoT”

Will the new generation of IoT­-related data benefit us enough to be comfortable giving up even more of our privacy?

For most of us, the internet of things (IoT) might call to mind specific gadgets – slick innovations like Nest thermostats or the Apple Watch – that seem to owe their provenance to science fiction and promise a more wired world, as well as the inevitable automation of everyday life.

Then there are people like serial entrepreneur Nova Spivack, someone who’s far less enamoured of the next IoT device than he is with something infinitely geekier: the data that can be captured. Continue reading “Will the new generation of IoT­-related data benefit us enough to be comfortable giving up even more of our privacy?”

Secure Connection on a Very Small Micro-processor for IoT Devices, Presented by INSIDE Secure

INSIDE Secure MatrixSSL Tiny allows manufacturers to affordably secure their IoT devices by providing a secure connection on a very small micro-processor. INSIDE Secure, a leader in embedded security solutions for mobile and connected devices, today announced the availability of MatrixSSL Tiny, the world’s smallest Transport Layer Security (TLS) software implementation, to allow companies to affordably secure IoT devices with stringent memory requirements. Continue reading “Secure Connection on a Very Small Micro-processor for IoT Devices, Presented by INSIDE Secure”

The Internet of Hacked Things- Security, a Major Problem IoT Will Face

Life—or, at least, the technology-adoption lifecycle—is so predictable. In October 2014, when we launched IOT Journal, I wrote, in an opinion column, “There is a lot of hype about the Internet of Things, and that hype will fade, just as it did for RFID and eventually does for all new technologies” (see The Internet of Things Journal). Continue reading “The Internet of Hacked Things- Security, a Major Problem IoT Will Face”

Operators Must Pay Attention to Data Issues around Wearable Tech

If 2014 was the year of the fitness tracker, then 2015 seems destined to be the year of the smartwatch. Whilst there are a range of potential legal consequences for CSPs in becoming involved in wearable tech, from consumer and product liability issues (if the CSP retails such products) to advertising and marketing issues (in relation to the promotion of such products and services), it is the data issues which are potentially of most interest. Continue reading “Operators Must Pay Attention to Data Issues around Wearable Tech”

IoT Security, after First Proven Cyberattack Involving Conventional Household “Smart” Appliance

The “Internet of Things” has taken off with all of the subtlety of a rocket launching. With everything from refrigerators to smoke detectors to sprinkler systems becoming network/Internet accessible, sales of smart home devices will reach 20.7 million units this year and increase to 35.9 million units by 2017, according to a CEA and Parks Associates forecast. The same study found that 13 percent of U.S. broadband households own at least one smart home device. Continue reading “IoT Security, after First Proven Cyberattack Involving Conventional Household “Smart” Appliance”