Ensuring Security in the IoT era
Under the IoT umbrella comes a huge range of interconnected devices and applications, ranging from CCTV to IP connectivity to wearables that accumulate and generate cascades of data. Although IoT devices have improved connectivity to a great extent, the unavoidable question that persists is—why and how IoT poses security concerns for individuals and enterprises alike? With the sheer amount of data at disposal, IoT devices provide an easy entry for data intruders and hackers. Owing to the connectivity of these devices to the internet, the impact of a compromised appliance can prove detrimental to users’ privacy. While large-scale enterprises and safety-critical systems often have the resources—security experts and capital—to fortify their IoT devices, even something as simple and cost-effective as a smart refrigerator can be hacked into by malicious bad actors. Even if the data from IoT tools are in the cloud, the prospect of hackers gaining access to that data must be considered.
IoT devices such as smartphones, tablets, watches, and even heating systems are often easily accessible and vulnerable that can enable access to the IoT network. For instance, PIN code phishing could provide access to a device that contains an app, which is connected to the IoT system. Ensuring efficient data security and data access to only authorized users are imperative to avert data intrusions. Security codes must be well protected and discreet. Any code alteration must be detected instantly and should be permitted to only authenticated users. Moreover, it’s essential to determine if the connected devices are authentic and inspect if their critical functionality tampers. Thus, strong authentication and cryptographic key protection are key to securing IoT devices and the data that they aggregate.
Big Data: Blessing or a Boon?
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Dave Doyle, CIO & SVP, IT, Regal Entertainment Group
By Sergey Cherkasov, CIO, PhosAgro
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Thomas Musgrave, EVP & CIO, AmeriCold Logistics
By Vin Sharma, Director, Strategic Planning & Marketing, Big...
By Federico Flórez, Chief Information & Innovation Officer,...
By Barbara Adams, VP, Innovative Technology Solutions, Texas...
By John Mason, CIO, Bottomline Technologies
By Jamshid Khazenie, CTO, USA Today Network / Gannett
By Miguel Gamino, CIO & Executive Director-Department of...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By John Landwehr, Public Sector CTO, Adobe
By Aaron Gette, CIO, The Bay Club Company
By Denise Zabawski, CIO, Nationwide Children's Hospital
By Amit Bahree, Executive, Global Technology and Innovation,...