The Value Of Trust

It took 40 years for Alexander Graham Bell’s telephone to go from 10% to 40% global saturation. The smartphone repeated that market penetration in less than a tenth of the time. But even the success of the smartphone is being eclipsed by the lightning pace at which Internet of Things (IoT) products are being born, with Gartner predicting that 95% of all technology products will be IoT-capable... » read more

Imperfect Silicon, Near-Perfect Security

Some chipmakers, under pressure to add security to rapidly growing numbers of IoT devices, have rediscovered a "fingerprinting" technique used primarily as an anti-counterfeiting measure. [getkc id="227" kc_name="Physically unclonable functions"] (PUFs) are used to assign a unique identification number based on inconsistencies in the speed with which current causes a series of logic gates to... » read more

Securing The Industrial Internet Of Things

Objects, sensors, actuators and controllers that were once designed for stand-alone operation are now increasingly connected by means of intelligent software and networks – forming the basis of the Industrial Internet of Things (IIoT). To be sure, GE defines the IIoT as “a network of a multitude of devices connected by communications technologies that results in systems that can monitor, co... » read more

Securing Smart Homes

One year after Mirai malware hijacked more than 100,000 connected devices for its botnet and launched a denial of service attack — which briefly blocked access to popular sites such as Netflix, PayPal, Amazon and Twitter — [getkc id="76" kc_name="IoT"] device makers are just beginning to get smarter about home security. Security concerns reach deeper into the home than just the Internet ... » read more

Playing Catch Up With IoT Security

While the benefits of the Internet of Things (IoT) are clear, security hasn’t managed to keep up with the rapid pace of innovation and deployment. As the U.S. Department of Homeland Security (DHS) recently stated, an unsecured IoT ecosystem introduces real-world risks that include malicious actors manipulating the flow of information to and from network-connected devices or tampering with dev... » read more

IoT Security Challenges, Opportunities

The specter of cybersecurity is haunting the Internet of Things—or more specifically, the lack of it. Big companies in information technology and telecommunications have embraced the [getkc id="76" kc_name="IoT"] as a significant business opportunity, and the field is inspiring hundreds of startups in Silicon Valley and elsewhere. Venture capitalists hungrily eye the IoT, betting on which ... » read more

Testing For Security

Ever since the IoT became a household name, people have been strategizing about ways to utilize non-secure devices to mount an attack. The first instances of using electricity to overload a device's circuits, thereby neutralizing existing security features, came to light in some of the earliest car hacking incidents. These are basically side-channel attacks using what amounts to an electroni... » read more

Internet Security? Not Even Close

This week's outage at Amazon Web Services is yet another reminder that Internet security is still not quite there. Amazon isn't a second-tier cloud services provider. It's one of the biggest cloud companies on the planet. If Amazon can't get it right, it's hard to imagine anyone can. The company's Simple Storage Service, aka S3, was the target, and it took about five hours before this online... » read more

Will 2017 Be The Year Of DDoS?

Forrester Research sees a rough year ahead for cyber security. Indeed, targeted espionage, ransomware, denial of service, privacy breaches and more are expected to escalate in 2017. In addition, Forrester Researcher analysts predict that more than 500,000 Internet of Things (IoT) devices will be compromised in 2017. Perhaps not surprisingly, IDC analyst Kevin Lonergan recently warned that Io... » read more

Is Security All Talk?

Security is the No. 1 recurring theme at conferences these days. And given the explosion in the number of conferences this year—up to a half dozen some weeks just in Silicon Valley—that's a lot of attention being showered on security. At nearly all of these talks, there is at least a mention about recent breaches, pervasive and persistent risks, and the growing threat level. The topic of... » read more

← Older posts