IoT Security Flaws Are Putting Your Business at Risk

LILLA ROSS | March 5, 2020

article image
As industries invest in the next generation of technology, the internet of things is at the top of the list. Once a novelty best known in residential settings, IoT technology has become mainstream in business and industry. Some even predict that having a Google Home or Amazon Echo in the conference room will become the norm. Now, you will find connected devices in Amazon’s warehouse robotics system Kiva, Airbus’ Factory of the Future and the augmented reality used by Caterpillar in its Cat Connect system. The number of IoT devices in use by 2025 could reach 22 billion, according to an IoT Analytics report. They will transform manufacturing, warehouse and logistics, health care, agriculture, shipping, energy and aviation. IoT security can’t be done as an afterthought; it must be integrated into operations from Day One because connected devices and systems use cryptographic keys that transmit data. Cybercriminals can gain access through these keys, allowing them to infect devices and systems with malware, steal data or shut down systems. Sometimes, the vulnerability has gone undetected for months.

Spotlight

Neptuny

Neptuny solutions are based on both proprietary and third-party products and on best-in-class consulting services. Neptuny flagship product is Caplan ("Capacity Planning made easy"), the holistic, agent-less and automated solution that allows customers to safely rationalize, optimize and consolidate their data centers. Neptuny major references are leading companies in different market segments in Europe and US.

OTHER ARTICLES

What Is IoT Forensics? Challenges Ahead and Best Tools to Use

Article | May 24, 2021

Internet of Things, generally known as IoT, is a network of objects or things. Embedded sensors help connect and exchange data with other objects via the internet. IoT is often related to the concept of smart homes, including devices like home security systems, cameras, lighting, refrigerators, etc. With all this data being transmitted over the internet, it is easy for the data to be modified, deleted, or stolen, which can lead to an invasion, theft, etc. IoT forensics plays a vital role in maintaining the integrity and security of the data being transmitted. Join us as we explore this fascinating web of devices and how you can get started in this vibrant field of forensics.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | March 20, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

Breaking Down IoT Standards and Protocols

Article | March 10, 2020

The Internet of Things has given rise to a host of new standards and protocols. Still more protocols that originally existed for other purposes but are well suited to new IoT applications have been adopted by device manufacturers and application creators. Though in some senses IoT devices are the same as any other internet-connected device, the bandwidth, power, and transmission distance constraints inherent in many IoT applications require novel new solutions to the fundamental actions of connectivity, data transfer, device discovery, and communication. This article will serve as a brief glossary of terms related to IoT communication protocols and standards. Click here for a more complete introduction to connectivity options.

Read More

AI and IoT projects optimize industries inside and out

Article | March 11, 2020

When people think of AI, it's easy to jump to the many possible uses seen in movies -- such as accessing secret areas with biometric data or robots completing human jobs -- but applying AI realistically requires architects and administrators to understand just how flexible AI is in a business setting. Tech leaders have rapidly increased the number of AI and IoT projects in many areas of their businesses, including customer experience, data analysis and security. When organizations apply AI into these different aspects, they can more effectively process the IoT data they create and further improve their operations and products. Popular movies have made customer experience AI one of the better-known examples of AI. Ads may not be as flashy as the personally tailored ones using customer biometrics as seen in The Minority Report, but it's easy to see how organizations will get there from the online ads that use AI to give consumers offers specific to their interests. Businesses use AI that learns from data analytics on customer behavior throughout the IoT customer journey.

Read More

Spotlight

Neptuny

Neptuny solutions are based on both proprietary and third-party products and on best-in-class consulting services. Neptuny flagship product is Caplan ("Capacity Planning made easy"), the holistic, agent-less and automated solution that allows customers to safely rationalize, optimize and consolidate their data centers. Neptuny major references are leading companies in different market segments in Europe and US.

Events