IoT Attacks

| July 25, 2019

article image
The Internet of Things (IoT) presents numerous benefits to consumers, and has the potential to change the ways that consumers interact with technology in fundamental ways. In the future, the Internet of Things is likely to meld the virtual and physical worlds together in ways that are currently difficult to comprehend.

Spotlight

OSI Consulting

OSI Digital, Inc., (formerly OSI Consulting, Inc.) provides purpose-built business and technology solutions that optimize performance to enable data-driven outcomes for our customers. OSI accelerates digital transformation by offering integrated solutions that capture, secure, integrate, analyze and optimize data. Our services include the design, development, and implementation of new solutions as well as the ongoing management, enhancement and support of our customers’ existing business systems.

OTHER ARTICLES

The role of BSS in the journey to 5G monetization

Article | March 24, 2020

The rollout of commercial 5G services is well underway. This evolution is unlocking exciting new opportunities, but it also presents new challenges. To capture new 5G revenue streams, service providers must transform their existing business support systems (BSS), and develop clear roadmaps to guide this transformation. In the latest MIT Insights report, telecom executives share their vision for 5G-enabled BSS, and how they are preparing for it. Here, we explore some of the highlights. The benefits of 5G are well-documented. Low-latency connectivity and superior broadband speeds will open doors to fully automated factories and put driverless vehicles on our roads. Service providers will be able to provide cutting-edge solutions and superior consumer experiences. However, monetizing a 5G-fuelled IoT society requires a clear strategic roadmap – particularly when it comes to BSS. As 5G matures, BSS will play an increasingly important role in establishing the service provider’s position in the value chain – and having a clear BSS evolution plan is crucial.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Article | April 9, 2020

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.

Read More

Hardware Threats to an IoT Ecosystem

Article | March 31, 2020

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

Spotlight

OSI Consulting

OSI Digital, Inc., (formerly OSI Consulting, Inc.) provides purpose-built business and technology solutions that optimize performance to enable data-driven outcomes for our customers. OSI accelerates digital transformation by offering integrated solutions that capture, secure, integrate, analyze and optimize data. Our services include the design, development, and implementation of new solutions as well as the ongoing management, enhancement and support of our customers’ existing business systems.

Events