8 Critical IoT Security Technologies
These numbers are staggering and suggest that standard PC security and anti-virus solutions will not be able to counter future cybersecurity threats on connected IoT devices. The need for more robust measures to secure IoT embedded devices was confirmed by recent Forrester’s TechRadar research that defined the use cases, business value, and outlook for the 13 most relevant and important IoT security technologies. This included core technologies, such as IoT authentication and IoT encryption, in addition to emerging IoT security technologies like IoT threat detection, IoT blockchain, and IoT security analytics. (Read More)
Security leaders: Prepare Now for the Convergence of IT, OT and IoT
Adi Dar, CEO of Cyberbit, points out that attackers don’t care. Dar led Cyberbit since it was spun off from Elbit Systems, Israel’s largest defense contractor and the #26th largest in the world (NASDAQ: ESLT). Prior to that, Dar served as CEO of Elop — one of the world’s leading defense electrooptic technology providers and part of the Elbit Group. Dar noted that attackers adept at finding and slipping through the cracks gain an advantage. Understanding this drives a need for us to develop a more complete and timely picture. It’s a pathway to prepare ourselves and our organizations. (Read More)
Nokia: ISPs and Users Must be Aware of IoT Security
Users must protect themselves and their IoT devices by changing default passwords and regularly updating software/firmware. More professional and industrial IoT users should also monitor IoT device and logs for security-related events. It’s a prime responsibility of IoT device and hub manufacturers to quickly address known security vulnerabilities in their installed base through software patches. But it’s impossible to completely secure billions of IoT devices against malware attacks. (Read More)