Ensuring Security in the IoT era
Under the IoT umbrella comes a huge range of interconnected devices and applications, ranging from CCTV to IP connectivity to wearables that accumulate and generate cascades of data. Although IoT devices have improved connectivity to a great extent, the unavoidable question that persists is—why and how IoT poses security concerns for individuals and enterprises alike? With the sheer amount of data at disposal, IoT devices provide an easy entry for data intruders and hackers. Owing to the connectivity of these devices to the internet, the impact of a compromised appliance can prove detrimental to users’ privacy. While large-scale enterprises and safety-critical systems often have the resources—security experts and capital—to fortify their IoT devices, even something as simple and cost-effective as a smart refrigerator can be hacked into by malicious bad actors. Even if the data from IoT tools are in the cloud, the prospect of hackers gaining access to that data must be considered.
IoT devices such as smartphones, tablets, watches, and even heating systems are often easily accessible and vulnerable that can enable access to the IoT network. For instance, PIN code phishing could provide access to a device that contains an app, which is connected to the IoT system. Ensuring efficient data security and data access to only authorized users are imperative to avert data intrusions. Security codes must be well protected and discreet. Any code alteration must be detected instantly and should be permitted to only authenticated users. Moreover, it’s essential to determine if the connected devices are authentic and inspect if their critical functionality tampers. Thus, strong authentication and cryptographic key protection are key to securing IoT devices and the data that they aggregate.
Big Data: Blessing or a Boon?
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment