8 Critical IoT Security Technologies
A recent report by Gartner predicts that there will be 20.4 billion connected Internet of Things (IoT) devices by 2020, with 5.5 million new things getting connected every day. Furthermore, more than half of major new business processes and systems will include an IoT component by 2020.
These numbers are staggering and suggest that standard PC security and anti-virus solutions will not be able to counter future cybersecurity threats on connected IoT devices. The need for more robust measures to secure IoT embedded devices was confirmed by recent Forrester’s TechRadar research that defined the use cases, business value, and outlook for the 13 most relevant and important IoT security technologies. This included core technologies, such as IoT authentication and IoT encryption, in addition to emerging IoT security technologies like IoT threat detection, IoT blockchain, and IoT security analytics. (Read More)
Security leaders: Prepare Now for the Convergence of IT, OT and IoT
Is the way we practice security is dependent on context? We have physical security teams. We information security and cybersecurity teams. Sometimes we blend the teams together. As the Internet of Things (IoT) gains steam, we publicly question and even lament the security included there, if at all.For some, security is a silo. For others, security is blended.
Adi Dar, CEO of Cyberbit, points out that attackers don’t care. Dar led Cyberbit since it was spun off from Elbit Systems, Israel’s largest defense contractor and the #26th largest in the world (NASDAQ: ESLT). Prior to that, Dar served as CEO of Elop — one of the world’s leading defense electrooptic technology providers and part of the Elbit Group. Dar noted that attackers adept at finding and slipping through the cracks gain an advantage. Understanding this drives a need for us to develop a more complete and timely picture. It’s a pathway to prepare ourselves and our organizations. (Read More)
Nokia: ISPs and Users Must be Aware of IoT Security
Individual users are typically not directly targeted by these DDoS attacks. Instead, IoT users are most often unwitting enablers when connected devices they own are compromised by malware, then recruited in botnets to launch attacks on service providers and large, cloud-connected enterprises. The Mirai malware exploited security vulnerabilities in CCTV cameras that most users weren’t aware of.
Users must protect themselves and their IoT devices by changing default passwords and regularly updating software/firmware. More professional and industrial IoT users should also monitor IoT device and logs for security-related events. It’s a prime responsibility of IoT device and hub manufacturers to quickly address known security vulnerabilities in their installed base through software patches. But it’s impossible to completely secure billions of IoT devices against malware attacks. (Read More)