Security Market Segment LS
Thursday, 10 November 2016 10:40

Time to act on IoT security before it is too late


"We really need to treat IoT security with a sense of urgency."

So said Intel general manager of IoT security Lorie Wigle at Intel Security's Focus 16 conference last week.

IoT security is really just security, she said, but the window is closing on the ability to implement IoT with maximum security and minimum risk.

The recent attack on Dyn showed how IoT devices can be co-opted by evildoers.

Wigle pointed out that item such as fridges and cars have a useful life of 15 to 20 years, so it will be very important that they can be patched and updated throughout that time.

(In the real world this is also an issue for more traditional devices such as computers, smartphones and tablets - for example, there are many Android devices and Apple products that are still in use running operating system versions that are no longer being updated when security issues are revealed.)

But there are also issues stemming from configuration errors rather than software bugs.

The Mirai botnet was possible because so many devices were shipped with default passwords and users either didn't know or didn't bother to change them. Intel is working on technology that will provide devices with preprogrammed credentials so users do not need to use passwords.

The threat defence lifecycle - protect, detect, correct, adapt - should be applied to IoT, she suggested, noting that the 'protect' aspect needs to cover the entire supply chain.

Measures that can be taken on the software side include whitelisting, data encryption, security analytics, policy management, provisioning, and remediation. Hardware techniques such as trusted execution environments also have roles to play.

"No one company can solve the IoT security problem," said Wigle, so Intel is working with a number of device manufacturers including Philips, NCR, Toshiba and Sharp.

Disclosure: The writer attended Focus 16 as a guest of Intel Security.


Recently iTWire remodelled and relaunched how we approach "Sponsored Content" and this is now referred to as "Promotional News and Content”.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.



Some of the most important records are paper-based documents that are slow to issue, easy to fake and expensive to verify.

Digital licenses and certificates, identity documents and private citizen immunity passports can help you deliver security and mobility for citizens’ information.

Join our webinar: Thursday 4th June 12 midday East Australian time


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.



Recent Comments