IoT Device Lifecycle: Where Security Fits In

IoT Device Lifecycle: Where Security Fits In

Embedded hardware security can help secure IoT devices. But because IoT ecosystems involve a multitude of IoT devices and have the potential to be complex, the process of securely onboarding, configuring, updating, and operating devices must be taken into account across device categories and industries.

IoT security principles are critical – and they already exist

IoT security principles are critical – and they already exist

As with all information systems, basic security principles are critical for IoT implementation. The Secure Technology Alliance IoT Security Council recently published a white paper called “Embedded Hardware Security for IoT Applications,” which provides basic security principles for securing IoT.

Is security part of your IoT plans?

Is security part of your IoT plans?

In 2016, the Internet of Things crossed the six billion mark, with healthcare, smart city, consumer electronics, industrial, payments and numerous other verticals developing services and products that rely on an IoT infrastructure. But where’s the protection plan for IoT? You can’t buy a warranty against security breaches.

Salesforce CTO Says 'We Need to Change the Way We Build Everything' to Ensure IoT Security

Salesforce CTO Says 'We Need to Change the Way We Build Everything' to Ensure IoT Security

While the Internet of Things (IoT) has created endless possibilities by allowing everyday objects to have network connectivity, it has also created more opportunities for security vulnerabilities.

The Internet of Things Has Promise – But it Also Has Hackers

The Internet of Things Has Promise – But it Also Has Hackers

The Internet of Things (IoT) promises to make life more convenient, but where does security fit in? With that convenience comes the potential of a huge headache. While the promises are great, so are the opportunities for hacking into the very convenience that can make life less difficult.

Internet-Connected Devices Need Better Security – Even Your Crock-Pot

Internet-Connected Devices Need Better Security – Even Your Crock-Pot

Several years ago, bed bugs in the fanciest of New York City hotels put thousands of travelers on edge. Pest services made a lot of money, as did retailers who sold bedding products. Bugs are back, but instead of infecting mattresses and pillowcases, they’ve worked their way into devices that are part of the Internet of Things. Many of today’s Internet of Things (IoT) of those connected devices, from connected crock-pots to refrigerators, are riddled with security flaws, leaving them vulnerable to attacks, according to research by Scott Tenaglia and Joe Tanen from Invincea Labs in Virginia

Record-breaking DDoS Attacks Highlight Critical Need for Embedded Security in Connected IoT Devices

Record-breaking DDoS Attacks Highlight Critical Need for Embedded Security in Connected IoT Devices

A cascading string of distributed denial-of-service (DDoS) attacks—most recently taking down parts of hundreds of sites including Twitter, Netflix, Spotify, Airbnb, Reddit and The New York Times—has demonstrated record-breaking volumes that are overwhelming website defenses. The four-fold growth in attack size over the last year is being driven by hundreds of thousands of internet-connected devices hackers are adding to their botnets, according to industry sources.

Security of Things 2016 Recap: A Focus on IoT Device and Data Security Challenges and Solutions

Security of Things 2016 Recap: A Focus on IoT Device and Data Security Challenges and Solutions

Executives from the Internet of Things (IoT) and security industries gathered in Chicago last week for the Smart Card Alliance’s 2016 Security of Things conference, where they provided insights and perspectives on security, privacy and authentication in the rapidly growing IoT ecosystem.

Is Your Barbie Doll Spying on You? Why Security is a Must in Every IoT Device

Is Your Barbie Doll Spying on You? Why Security is a Must in Every IoT Device

The security and privacy of IoT-enabled devices is a popular topic amongst connected car manufacturers, smart home developers and connected wearables. But as seemingly harmless things like Barbie dolls, stuffed animals and toy droids become connected to the IoT (and they are), what measures are being taken to ensure the security and privacy of those devices, if any? And is security a concern for something so ordinary?

Is Security Baked into your IoT Design?

Is Security Baked into your IoT Design?

If you’re designing a connected device for the Internet of Things (IoT), there are six key IoT design mistakes to avoid, Gianfranco Bonanome writes on TechTarget’s IoT Agenda. Bonanome addresses points such as whether you should even connect your device, if your design is scalable, and most importantly, when to consider your security approach.

What It All Boils Down to: There’s No Room for Lax IoT Security

What It All Boils Down to: There’s No Room for Lax IoT Security

A fully connected world isn’t as far off as you might think. Gartner says 5.5 million new “things” are being connected every day, and by 2020, there will be 21 billion connected devices in the market.

Tech Expert Ben Dickson on a More Secure IoT Infrastructure

Tech Expert Ben Dickson on a More Secure IoT Infrastructure

The things that make the Internet of Things (IoT) so great – the ability to connect, automated data sharing, the increasing number of connected devices, the endless opportunities for innovation – are also the things that make IoT vulnerable.

Accenture’s IoT Security Call to Action

Accenture’s IoT Security Call to Action

What do we need to do as an industry to secure IoT? Accenture’s latest brief, “Security Call to Action: Preparing for the Internet of Things,” says the most challenging aspects involve the IoT’s sheer expanse, and the diversity of industries and use cases it embraces. What does this mean for security? There is no one-size-fits-all solution.