The Internet of Things delivers new ways to create and capture business value, but also creates some frightening new vulnerabilities that organizations must take specific actions to address.
The rapidly expanding Internet of Things (IoT) is poised to generate huge volumes of data and deliver valuable business insights. But it also introduces substantial new risk.
A defining element of the Internet of Things (IoT) is that objects are not merely smart—equipped with sensors and processing power—but also connected: able to share the information they generate. More data, and more sensitive data, accessible across a broad network of interconnected stakeholders could pose significant dangers if compromised. As the World Economic Forum reported in March, “Hacking the location data on a car is merely an invasion of privacy, whereas hacking the control system of a car would be a threat to a life.” The rise of IoT requires enterprises to put in place systems to protect this new source of information-based value.
Organizations need to be Secure.Vigilant.Resilient.™ in order to effectively manage their enterprise cyber risks, and this paradigm also applies to IoT. By adopting a Secure.Vigilant.Resilient. approach, companies may address proliferating vulnerabilities and the rising sophistication of cyber attacks. This three-pronged, risk-based approach aims to focus organizations on their most important assets and invest in cost-justified security controls designed to protect them. It also emphasizes in equal measures a need to gain greater visibility into threats and to improve coordination of response efforts to reduce the impact of a cyber attack. Continue reading “New Vulnerabilities and Safeguarding of IoT”
For most of us, the internet of things (IoT) might call to mind specific gadgets – slick innovations like Nest thermostats or the Apple Watch – that seem to owe their provenance to science fiction and promise a more wired world, as well as the inevitable automation of everyday life.
Then there are people like serial entrepreneur Nova Spivack, someone who’s far less enamoured of the next IoT device than he is with something infinitely geekier: the data that can be captured. Continue reading “Will the new generation of IoT-related data benefit us enough to be comfortable giving up even more of our privacy?”
INSIDE Secure MatrixSSL Tiny allows manufacturers to affordably secure their IoT devices by providing a secure connection on a very small micro-processor. INSIDE Secure, a leader in embedded security solutions for mobile and connected devices, today announced the availability of MatrixSSL Tiny, the world’s smallest Transport Layer Security (TLS) software implementation, to allow companies to affordably secure IoT devices with stringent memory requirements. Continue reading “Secure Connection on a Very Small Micro-processor for IoT Devices, Presented by INSIDE Secure”
Life—or, at least, the technology-adoption lifecycle—is so predictable. In October 2014, when we launched IOT Journal, I wrote, in an opinion column, “There is a lot of hype about the Internet of Things, and that hype will fade, just as it did for RFID and eventually does for all new technologies” (see The Internet of Things Journal). Continue reading “The Internet of Hacked Things- Security, a Major Problem IoT Will Face”
If 2014 was the year of the fitness tracker, then 2015 seems destined to be the year of the smartwatch. Whilst there are a range of potential legal consequences for CSPs in becoming involved in wearable tech, from consumer and product liability issues (if the CSP retails such products) to advertising and marketing issues (in relation to the promotion of such products and services), it is the data issues which are potentially of most interest. Continue reading “Operators Must Pay Attention to Data Issues around Wearable Tech”
The “Internet of Things” has taken off with all of the subtlety of a rocket launching. With everything from refrigerators to smoke detectors to sprinkler systems becoming network/Internet accessible, sales of smart home devices will reach 20.7 million units this year and increase to 35.9 million units by 2017, according to a CEA and Parks Associates forecast. The same study found that 13 percent of U.S. broadband households own at least one smart home device. Continue reading “IoT Security, after First Proven Cyberattack Involving Conventional Household “Smart” Appliance”
To protect data against growing threats, networks must now act as both sensor and enforcer around traffic that passes through users and data centers to the cloud. There has definitely been a digital disruption within our industry. Continue reading “How The Hacker Economy Impacts Your Network & The Cloud”
Have you put much thought lately into what’s stored in your garage? If you have valuables in there next to your car, you might want to think about the hacking potential of your garage door. As it turns out, even your children’s old toys can be ideal for hacking into your home. Continue reading “This Hacked Toy Can Open Many Garage Doors In Seconds (VIDEO)”
Growing awareness of the Internet of Things has brought with it a desire amongst those building embedded systems to include some form of connectivity. But, as some of those designers have already found out to their cost, providing connectivity is one thing; providing security for such a system is another. Continue reading “You want to add security to your system, but where do you start?”
A brief encounter with John Matherly on this way for IoT keynote at the Internet of Things Event. John runs the world’s only search engine that actively finds and maps all devices directly connected to the Internet, including IoT devices. Continue reading “John Matherly, Shodan: Aspects of the IoT that others are not talking about”