Protecting Smart Devices and Applications Throughout the IoT Ecosystem

| June 6, 2017

article image
The Internet of Things (IoT) presents security challenges that left unmitigated could pose serious risk to organizations. For example, consider the lack of human supervision of thousands upon thousands of connected devices which precludes using some of the most effective security methods that have been developed for and proven out in cloud applications.

Spotlight

Jet Global

Jet Global delivers total data access and control from Microsoft Dynamics so board members, executives, finance professionals, and managers can make decisions at the speed of business without the need for bottlenecked technical resources, or data expertise. Empowering users and making them instantly successful and productive, we leverage industry-leading tools like Excel and Power BI, which deliver the data you need in an environment that is both user-friendly, familiar, and secure. Jet solutions focus on reducing the ongoing tension between IT and stakeholders by liberating the consistently over tasked technical resources, allowing them to focus on innovating and driving the strategic aspects of the business.

OTHER ARTICLES

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | March 13, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

Four ways to ensure IoT success

Article | April 15, 2020

Three out of four IoT projects are considered a failure, according to Cisco. This is troubling but even more so when Cisco also found 61 per cent of companies say they believe they’ve barely begun to scratch the surface of IoT can do for their business? Businesses believe in the long-term value offered by integrating IoT into their business plan, however, they lack the knowledge of what is required to ensure the success of such a complex project. By studying past failed projects, technology leaders can gain a better understanding of why they failed and what they can do differently when evaluating and undertaking new IoT initiatives.

Read More

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Which IoT Applications will Benefit Most from Edge Computing?

Article | March 2, 2020

Edge computing refers to information being processed at the edge of the network, rather than being sent to a central cloud server. The benefits of edge computing include reduced latency, reduced costs, increased security and increased business efficiency. Transferring data from the edge of a network takes time, particularly if the data is being collected in a remote location. While the transfer may usually take less than a second, glitches in the network or an unreliable connection may increase the time required. For some IoT applications, for example, self-driving cars, even a second may be too long. Imagine a security camera that’s monitoring an empty hallway. There’s no need to send hours of large video files of an empty hallway to a cloud server (where you will need to pay to store them). With edge computing, the video could be sent to the cloud only if there is movement detected in the hallway.

Read More

Spotlight

Jet Global

Jet Global delivers total data access and control from Microsoft Dynamics so board members, executives, finance professionals, and managers can make decisions at the speed of business without the need for bottlenecked technical resources, or data expertise. Empowering users and making them instantly successful and productive, we leverage industry-leading tools like Excel and Power BI, which deliver the data you need in an environment that is both user-friendly, familiar, and secure. Jet solutions focus on reducing the ongoing tension between IT and stakeholders by liberating the consistently over tasked technical resources, allowing them to focus on innovating and driving the strategic aspects of the business.

Events