IoT Security News
Solution providers must go beyond mobile devices’ inadequate built-in security mechanisms while also ensuring the necessary “always-on” connectivity for reliably exchanging safety-critical data and commands between smartphone apps, the IoT devices and the cloud.
The IoT has massively broadened the potential threat landscape for the entire market. To mitigate this vulnerability, industry best practices dictate that the authentication model of the connected device be strengthened using a secure element that has been configured for storing private keys and handling crypto-algorithmic secrets. Unfortunately, due mostly to supply chain logistic constraints, this approach has been challenging to onboard for most small-to-medium sized deployments.
If you like Sci-Fi movies you can probably name a couple of films where robots went rogue. People have worried about the use of Artificial Intelligence (AI) and robots for decades now. As the Internet of Things (IoT) grows more popular it brings a whole new debate to the table. Is it safe?
The Secure Technology Alliance is hosting a free two-part webinar series to provide best practices for protecting data and securing IoT devices throughout the entire IoT ecosystem.
During CES last week, you were likely inundated with announcements and demos of the hottest new internet-connected products. But as Lindsey O’Donnell points out in a recent article on ThreatPost, one thing you didn’t see was how to secure those devices.
By 2025 there will be more than 55 million internet-connected devices, leaving the potential for millions of unsecured access points in businesses, homes and cities. To lead the industry toward an ultimately safer IoT ecosystem, the Secure Technology Alliance will host a half-day IoT security boot camp this October for non-technical business professionals who are designing or deploying internet-connected devices.
It has been almost two years since the record-breaking DDoS attacks used hundreds of thousands of IoT devices-turned-botnets to take down popular websites across the internet. But how much has IoT security improved since then?
In the spring, the Department of Homeland Security released its cybersecurity strategy to prevent and disrupt cybercrimes and included discussions on IoT security.
As more devices get plugged into the Internet of Things (IoT), more vulnerabilities for data breaches emerge. These weaknesses in the IoT infrastructure come at a weighty cost not only for organizations, but individual consumers as well.
As part of its efforts to engage in industry dialogue and to help move important standards efforts like this forward, the Secure Technology Alliance IoT Security Council members worked together to compile their industry insight and expertise on the topic in a formal response which has been provided to NIST.
The National Institute of Standards and Technology (NIST), which will host a conference in February on Cyber-Physical Systems (CPS), has announced the organization will employ an Internet of Things approach concerning “mission critical” applications such as transportation, public safety and utilities.
IoT technology can be transforming in the best of ways. But with the excitement of new IoT products and devices, it is crucial to consider the security of these devices a top priority to avoid a potential IoT disaster.
In a recent article, Tech Beacon recently offered up a synopsis of IoT’s poor security record.
Intel is putting enhanced security into its IoT technology that will positively impact the speed of the deployment of the IoT ecosystem at all levels.
The Internet of Things (IoT) is growing rapidly, but the security of these newly-connected devices is lagging behind. This perspective is supported by TechBeacon’s Christopher Null in an article, “The state of IoT security: Trusted connected devices a work in progress.”
IoT Payments 2017, a Secure Technology Alliance event, took place last month with sessions covering the most important developments, innovations and efforts driving secure, seamless IoT payments.
The Internet of Things promises to revolutionize the payments industry. Consumers are ready for IoT payments. The Secure Technology Alliance is ready to take the lead. We’ve created IoT Payments 2017, the one conference bringing together financial executives, device and application providers, and retail experts for a detailed look into the evolving intersection of payments and IoT.
A new bill, the Internet of Things Cybersecurity Improvement Act of 2017, has been proposed to improve the cybersecurity of the Internet of Things (IoT) in government.
As companies continue to use unsecured IoT devices for business and operational decisions, the IoT industry presents possible catastrophic security risks for loss of data or theft.
IoT devices are potential entry points to wider IoT ecosystems, making security essential. The Secure Technology Alliance’s IoT Security Council recently published a white paper called “Embedded Hardware Security for IoT Applications,” which outlines how to use embedded hardware to secure IoT applications.
Embedded hardware security can help secure IoT devices. But because IoT ecosystems involve a multitude of IoT devices and have the potential to be complex, the process of securely onboarding, configuring, updating, and operating devices must be taken into account across device categories and industries.
As with all information systems, basic security principles are critical for IoT implementation. The Secure Technology Alliance IoT Security Council recently published a white paper called “Embedded Hardware Security for IoT Applications,” which provides basic security principles for securing IoT.
In 2016, the Internet of Things crossed the six billion mark, with healthcare, smart city, consumer electronics, industrial, payments and numerous other verticals developing services and products that rely on an IoT infrastructure. But where’s the protection plan for IoT? You can’t buy a warranty against security breaches.
With a forecast of 4.3 internet-connected devices for every person in 2020, the first thought that comes to mind is security for, and of, those devices. But today, security is the missing thread across consumer, commercial and industrial IoT.
To guide the industry, the Smart Card Alliance’s Internet of Things Security Council put together a high-level educational resource, “Embedded Hardware Security for IoT Applications,” outlining the security value of embedded hardware technology in end devices used in IoT applications.
While the Internet of Things (IoT) has created endless possibilities by allowing everyday objects to have network connectivity, it has also created more opportunities for security vulnerabilities.
The Internet of Things (IoT) promises to make life more convenient, but where does security fit in? With that convenience comes the potential of a huge headache. While the promises are great, so are the opportunities for hacking into the very convenience that can make life less difficult.
Several years ago, bed bugs in the fanciest of New York City hotels put thousands of travelers on edge. Pest services made a lot of money, as did retailers who sold bedding products. Bugs are back, but instead of infecting mattresses and pillowcases, they’ve worked their way into devices that are part of the Internet of Things. Many of today’s Internet of Things (IoT) of those connected devices, from connected crock-pots to refrigerators, are riddled with security flaws, leaving them vulnerable to attacks, according to research by Scott Tenaglia and Joe Tanen from Invincea Labs in Virginia
A cascading string of distributed denial-of-service (DDoS) attacks—most recently taking down parts of hundreds of sites including Twitter, Netflix, Spotify, Airbnb, Reddit and The New York Times—has demonstrated record-breaking volumes that are overwhelming website defenses. The four-fold growth in attack size over the last year is being driven by hundreds of thousands of internet-connected devices hackers are adding to their botnets, according to industry sources.
Executives from the Internet of Things (IoT) and security industries gathered in Chicago last week for the Smart Card Alliance’s 2016 Security of Things conference, where they provided insights and perspectives on security, privacy and authentication in the rapidly growing IoT ecosystem.
As a content portal featuring relevant news, resources, expert commentary and thought leadership on the security and privacy of the Internet of Things (IoT), we accept and encourage contributed content from both Secure Technology Alliance members and non-member companies. If you are interested in contributing, please review our Contributor Q&A, and submit your story idea or draft to Adrian Loth at aloth@montner.com. We look forward to reading your submission!