IoT Readiness: 5 Network and Security Necessities

| June 25, 2019

article image
The Internet of Things (IoT) is introducing sensors into virtually every process and device, transforming product-focused companies into service-oriented digital partners. Take these examples for instance. Every step, machine, and supplier in the manufacturing process is becoming a shared data input, creating end-to-end digital supply chains crossing all parties involved.

Spotlight

Forcz

We are a Silicon Valley startup which has worked since 2013 to develop the mForce™ smart wristband. The mForce wristband replaces clunky legacy RC controller hardware with smart wearable technology. Smaller than most smartwatches, the mForce smart wristband lets users easily and accurately control electronic devices with intuitive wrist gestures. Combined with our Metron Force BrainReceiver™, just about any electronic device can be made to be controlled via mForce.

OTHER ARTICLES

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | April 14, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

How IoT is Opening New Capabilities for Enterprises

Article | March 2, 2020

The advent of the Internet of Things (IoT) has been crucial for the digital transformation of many industries in this new age. Today, numerous businesses are in great need of top-notch software development services and robust software solutions that can use IoT technology to its fullest extent. Many industries have embraced IoT technology. In manufacturing, it has been dubbed as the next industrial revolution. In retail, it allows for creating a more personalized shopping experience. And in other enterprises, it is frequently used as a way to streamline and optimize business processes for greater cost reduction and improved efficiency. IoT has truly transformed the way many companies do business today, from managing assets and tracking inventory to continuous process improvement and customer engagement. Here are some ways IoT has transformed many enterprises.

Read More

The road to industrial IoT security

Article | February 25, 2020

One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Read More

Spotlight

Forcz

We are a Silicon Valley startup which has worked since 2013 to develop the mForce™ smart wristband. The mForce wristband replaces clunky legacy RC controller hardware with smart wearable technology. Smaller than most smartwatches, the mForce smart wristband lets users easily and accurately control electronic devices with intuitive wrist gestures. Combined with our Metron Force BrainReceiver™, just about any electronic device can be made to be controlled via mForce.

Events