If you like Sci-Fi movies you can probably name a couple of films where robots went rogue. People have worried about the use of Artificial Intelligence (AI) and robots for decades now. As the Internet of Things (IoT) grows more popular it brings a whole new debate to the table. Is it safe?
The Secure Technology Alliance is hosting a free two-part webinar series to provide best practices for protecting data and securing IoT devices throughout the entire IoT ecosystem.
It has been almost two years since the record-breaking DDoS attacks used hundreds of thousands of IoT devices-turned-botnets to take down popular websites across the internet. But how much has IoT security improved since then?
As more devices get plugged into the Internet of Things (IoT), more vulnerabilities for data breaches emerge. These weaknesses in the IoT infrastructure come at a weighty cost not only for organizations, but individual consumers as well.
IoT devices are potential entry points to wider IoT ecosystems, making security essential. The Secure Technology Alliance’s IoT Security Council recently published a white paper called “Embedded Hardware Security for IoT Applications,” which outlines how to use embedded hardware to secure IoT applications.
As with all information systems, basic security principles are critical for IoT implementation. The Secure Technology Alliance IoT Security Council recently published a white paper called “Embedded Hardware Security for IoT Applications,” which provides basic security principles for securing IoT.
To guide the industry, the Smart Card Alliance’s Internet of Things Security Council put together a high-level educational resource, “Embedded Hardware Security for IoT Applications,” outlining the security value of embedded hardware technology in end devices used in IoT applications.
What do we need to do as an industry to secure IoT? Accenture’s latest brief, “Security Call to Action: Preparing for the Internet of Things,” says the most challenging aspects involve the IoT’s sheer expanse, and the diversity of industries and use cases it embraces. What does this mean for security? There is no one-size-fits-all solution.
As a content portal featuring relevant news, resources, expert commentary and thought leadership on the security and privacy of the Internet of Things (IoT), we accept and encourage contributed content from both Secure Technology Alliance members and non-member companies. If you are interested in contributing, please review our Contributor Q&A, and submit your story idea or draft to Adrian Loth at aloth@montner.com. We look forward to reading your submission!