Security Market Segment LS
Thursday, 10 November 2016 10:40

Time to act on IoT security before it is too late

By

"We really need to treat IoT security with a sense of urgency."

So said Intel general manager of IoT security Lorie Wigle at Intel Security's Focus 16 conference last week.

IoT security is really just security, she said, but the window is closing on the ability to implement IoT with maximum security and minimum risk.

The recent attack on Dyn showed how IoT devices can be co-opted by evildoers.

Wigle pointed out that item such as fridges and cars have a useful life of 15 to 20 years, so it will be very important that they can be patched and updated throughout that time.

(In the real world this is also an issue for more traditional devices such as computers, smartphones and tablets - for example, there are many Android devices and Apple products that are still in use running operating system versions that are no longer being updated when security issues are revealed.)

But there are also issues stemming from configuration errors rather than software bugs.

The Mirai botnet was possible because so many devices were shipped with default passwords and users either didn't know or didn't bother to change them. Intel is working on technology that will provide devices with preprogrammed credentials so users do not need to use passwords.

The threat defence lifecycle - protect, detect, correct, adapt - should be applied to IoT, she suggested, noting that the 'protect' aspect needs to cover the entire supply chain.

Measures that can be taken on the software side include whitelisting, data encryption, security analytics, policy management, provisioning, and remediation. Hardware techniques such as trusted execution environments also have roles to play.

"No one company can solve the IoT security problem," said Wigle, so Intel is working with a number of device manufacturers including Philips, NCR, Toshiba and Sharp.

Disclosure: The writer attended Focus 16 as a guest of Intel Security.

Read 3268 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

SONICWALL 2022 CYBER THREAT REPORT

The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Ransomware
Cryptojacking
Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.

GET REPORT!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments