Top 10 Internet of Things Vulnerability Category

| June 13, 2016

article image
The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies...

Spotlight

RSA

RSA’s Intelligence Driven Security solutions help organizations reduce the risks of operating in a digital world. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, prevent IP theft, fraud and cybercrime. Specialties Security, Identity Assurance, Encryption, Key Management, Advanced Threats, Network Monitoring, Network Forensics, Security Analytics, Adaptive Authentication

OTHER ARTICLES

What Is CBRS and How Does It Help IoT?

Article | February 26, 2020

The Internet of Things continues to grow fueled by applications that solve problems for enterprise customers. One of the biggest barriers to IoT solutions in enterprise settings is reliable and low-cost wireless connectivity. Where Wi-Fi, Bluetooth, LoRa, Zigbee and others have tried to solve the problem before, CBRS (Citizens Broadband Radio Service) is posed to offer a viable alternative for enterprise IoT connectivity. Specific to the United States, Citizen’s Broadband Radio Service (CBRS) is a piece of the radio spectrum between 3550 – 3700 MHz. This is a valuable area of the spectrum because it allows good propagation (ability to penetrate walls and go medium distances) with the benefits of higher bandwidth services, such as LTE and 5G.

Read More

The road to industrial IoT security

Article | February 25, 2020

One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Read More

Make Room For Public Clouds In Your Industrial IoT Strategy

Article | March 1, 2020

Not too long ago, executives from manufacturing and related industries would not consider running their internet of things (IoT) initiatives from a cloud. Now? It’s hard to find one who doesn’t enthusiastically embrace some role for the public cloud. Makers of industrial IoT (IIoT) software platforms have undergone a similar change of heart, pivoting from making grand plans for multibillion-dollar global data center rollouts to wholeheartedly partnering with one or more of the hyperscale public clouds. So far, so simple: Public cloud is definitely now part of the industrial IoT story. But there are a multitude of ways to use a public cloud, from just installing your own software there to fully integrating with all of the cloud, development, and IoT services that the hyperscale public cloud platforms increasingly offer. I explore this range of options in my latest report, “Hyperscale Public Clouds Power Your Industrial IoT Future,” and shall be discussing the issues in a client webinar on March 31.

Read More

What Is IoT Forensics? Challenges Ahead and Best Tools to Use

Article | May 24, 2021

Internet of Things, generally known as IoT, is a network of objects or things. Embedded sensors help connect and exchange data with other objects via the internet. IoT is often related to the concept of smart homes, including devices like home security systems, cameras, lighting, refrigerators, etc. With all this data being transmitted over the internet, it is easy for the data to be modified, deleted, or stolen, which can lead to an invasion, theft, etc. IoT forensics plays a vital role in maintaining the integrity and security of the data being transmitted. Join us as we explore this fascinating web of devices and how you can get started in this vibrant field of forensics.

Read More

Spotlight

RSA

RSA’s Intelligence Driven Security solutions help organizations reduce the risks of operating in a digital world. Through visibility, analysis, and action, RSA solutions give customers the ability to detect, investigate and respond to advanced threats; confirm and manage identities; and ultimately, prevent IP theft, fraud and cybercrime. Specialties Security, Identity Assurance, Encryption, Key Management, Advanced Threats, Network Monitoring, Network Forensics, Security Analytics, Adaptive Authentication

Events