The recipe for innovative Internet of Things applications

CHRIS O'CONNOR | March 1, 2016

article image
In my last blog, I touched on why open standards and collaboration are key to developing the Internet of Things (IoT). Now I want to discuss how open and collaborative development is a catalyst to IoT innovation.Developing Internet of Things applications can be a complex task. An Internet of Things application might do anything from remotely changing the temperature in a home to informing an aviation manufacturer that one of its engines somewhere in the world needs to be serviced.

Spotlight

HashedIn

HashedIn, a company founded in the year 2010, is a services company focused on building SaaS products and design-led product engineering. Leveraging its SaaS development expertise, HashedIn has been transforming enterprises using its cutting technology by bringing in Multi-tenancy, cloudification, next-gen UI/UX, and modularity.

OTHER ARTICLES

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

IoT Security: Inherent Risks Require Robust Solutions

Article | June 2, 2021

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | June 2, 2021

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

Hardware Threats to an IoT Ecosystem

Article | June 2, 2021

An IoT ecosystem, like any biome on Earth, is constantly subjected to changes and threats at various scales. Whether the system is an asset tracking solution in a hospital to help deliver more effective healthcare or cold chain management ensuring temperature control during transportation, the hardware/sensor is where the data journey commences in an IoT ecosystem. The integrity of these hardware components is paramount to the success of an IoT solution, but there are currently critical threat points on these devices which left unaddressed could be disastrous. Much of the focus of IoT security is on keeping the communicated data from IoT devices untampered up the solution stack. Methods like end-to-end AES encryption are currently standard by most network protocols and are well secured and tested.

Read More

Spotlight

HashedIn

HashedIn, a company founded in the year 2010, is a services company focused on building SaaS products and design-led product engineering. Leveraging its SaaS development expertise, HashedIn has been transforming enterprises using its cutting technology by bringing in Multi-tenancy, cloudification, next-gen UI/UX, and modularity.

Events