Towards Right-Sizing Security for M2M Solutions: A Practical Approach

| March 1, 2016

article image
Security for M2M solutions is a current research focus for Beecham Research, with a report due in early Q2 2013 that identifies a new balance and new opportunities emerging in the market.Security for M2M solutions is a current research focus for Beecham Research, with a report due in early Q2 2013 that identifies a new balance and new opportunities emerging in the market.

Spotlight

IoT Community

The IoTY Community’ is a platform to nurture and facilitate the collective power of collaboration, exploration and the advancement of the Internet of Things, Your Things! With a full time Community Manager bringing together leading IoT technical, product and commercial professionals we aim to traverse a broad base of IoT subjects as well as deep diving into advanced IoT technical discussions.

OTHER ARTICLES

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | June 2, 2021

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

Hitachi, Infineon promote IoT tech for viral detection

Article | June 2, 2021

Tech companies are stepping up Internet of Things technologies to protect against COVID-19 and future viruses by using LiDAR and infrared cameras to detect a person’s body temperature from a distance or even handwashing. Keeping the data secure in such detection is also going to be a challenge. One approach is to put a chip inside an IoT device when it is manufactured to enable strong authentication and secure communication, mainly to guard against device counterfeiting. Hitachi Vantara has touted forward looking infrared cameras (FLIR) cameras to detect the temperature of a person from a distance. That way a passenger on a train or a worker or a customer in a store can be non-intrusively screened, according to a blog from Mark Jules, global vice president of smart spaces and video intelligence.

Read More

Automotive Sales: Improving the Customer Experience Using IoT

Article | June 2, 2021

Customer touchpoints throughout the automotive sales cycle are prime candidates for IoT innovation. Across the board, the data derived from these IoT applications have the capability to provide insights and actionable outcomes which can significantly improve the customer experience. When a customer arrives at a dealership, it may be difficult for the dealer to know if they have what the customer is looking for. For instance, a customer might be coming in to see a particular vehicle, test-drive a car they’ve already seen, or to casually browse their options. Without any data behavior on the customer beforehand, sales personnel or the dealership may not be properly equipped to handle the customer’s request. Perhaps a requested car is no longer on the main show floor for immediate display but instead buried somewhere in a backlot. Maybe another car that was requested for a test drive may not yet be properly serviced for operation. These are only a few of the challenges associated with automotive sales that IoT is capable of helping to improve.

Read More

Spotlight

IoT Community

The IoTY Community’ is a platform to nurture and facilitate the collective power of collaboration, exploration and the advancement of the Internet of Things, Your Things! With a full time Community Manager bringing together leading IoT technical, product and commercial professionals we aim to traverse a broad base of IoT subjects as well as deep diving into advanced IoT technical discussions.

Events