Rethinking IoT Security With Blockchain: A Challenging Path Forward

GUEST WRITER | May 21, 2019

article image
Connected devices are everywhere in your home, in your car and sometimes even in your body. However, as the number of IoT devices grows, the opportunities for security breaches grow as well. Without a built-in method of data authentication, connected devices are susceptible to risks such as hijacking, man-in-the-middle attacks, spoofing or data breaches.

Spotlight

Covisint

Covisint provides an open, developer-friendly, enterprise-class cloud platform to facilitate the rapid development and deployment of Internet of Things (IoT), Identity Management (IdM), and B2B collaboration solutions. Our platform enables users to securely identify, authenticate and connect users, devices, applications and information, and has been successfully operating globally at enterprise scale for over 12 years. Today, the Covisint platform enables more than 3,000 organizations to connect with more than 212,000 business partners and customers, and supports more than $4 billion in eCommerce transactions annually.

OTHER ARTICLES

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

12 Industrial IoT Companies You Should Know

Article | February 10, 2020

As the industrial IoT market continues to expand at rapid rates, companies across the world are reaping the benefits. Utilizing this growing network of tools and systems, businesses have been able to prevent costly downtime, decrease product development costs, enhance customer engagement and satisfaction and acquire and implement intelligent data for strategic planning purposes.The potential benefits are seemingly endless, and the list of organizations that are embracing this industrial revolution is continuing to grow, so let’s highlight some of the main IIoT companies you need to know for a number of the most common IIoT use cases.

Read More

Smart Building Initiatives are the Building Blocks of a Smart City

Article | April 8, 2020

To paraphrase a well-known saying, the journey to a complete smart city begins with a single building. No matter the size of the city, the extent of the technology or the most helpful use cases, a prospective smart city can integrate into — or branch off of — initiatives pushed forward by a smart building or campus. And when there is an increasing demand for these types of solutions, large corporations have the opportunity to improve corporate and social governance practices, as well as stand out in their community by championing more connected technologies.

Read More

Frailties of LoRaWAN IoT Devices

Article | March 5, 2020

Low-power wide-area networks (LPWANs) are helping drive the Internet of things (IoT) explosion. They connect millions of low-power IoT and Industrial IoT (IIoT) devices into wireless networks over a range of distances, from short to really, really long, from indoor applications to those covering large fields or even cities. But device designers using the LoRaWAN standard may be lulled into thinking that just configuring its security keys is enough to prevent their devices from being hacked. A new report says it isn’t. Four protocols give enterprises a choice in LPWAN connectivity: cellular NB-IoT, LTE-M, and Sigfox, and the non-cellular LoRaWAN standard. Among these, the open LoRaWAN overwhelmingly dominates. Omdia (formerly IHS Markit – Technology) projects a “quite high forecast” for LoRa, said Lee Ratliff, senior principal analyst, connectivity and IoT.

Read More

Spotlight

Covisint

Covisint provides an open, developer-friendly, enterprise-class cloud platform to facilitate the rapid development and deployment of Internet of Things (IoT), Identity Management (IdM), and B2B collaboration solutions. Our platform enables users to securely identify, authenticate and connect users, devices, applications and information, and has been successfully operating globally at enterprise scale for over 12 years. Today, the Covisint platform enables more than 3,000 organizations to connect with more than 212,000 business partners and customers, and supports more than $4 billion in eCommerce transactions annually.

Events