For how many years now have federal CIOs and IT managers heard the bromide “security must be baked in, not bolted on?” It is one of those phrases that gets repeated so often that it’s lost its meaning, but the fact that it’s still considered wisdom today is itself meaningful.
The uncomfortable reality of cybersecurity is that it remains our nation’s biggest technology challenge. Despite high-profile security breaches that have embarrassed agencies and corporations, keeping up with vulnerabilities and staying ahead of hackers from both a technology and user education standpoint isn’t easy. This task is further complicated by the prevalence of siloed legacy technology, which drains agency budgets and limits their ability to make the most of mobile technologies. On average, agencies spend about 75 percent of their IT budgets operating and maintaining existing systems, leaving little opportunity to modernize, according to the Government Accountability Office.
Source: Security for the exploding Internet of Things ecosystem | FCW
Connected devices such as smart light bulbs, refrigerators and TVs are all bound by Wi-Fi networks. But that might not be the case for much longer.
Arm, a processor design company, is unveiling a new software stack, called Kigen, that would allow SIM cards to be integrated into internet-of-things devices. That is, your smart objects could connect to the internet more like a phone, rather than being dependent on Wi-Fi. And that could be big business: The company is looking ahead to a trillion connected devices by 2035, though the cellular IoT market would be only a portion of that.
Source: Arm’s Kigen design points to SIM cards for smart devices | CNET
Google on Thursday announced it will acquire LogMeIn’s Xively IoT platform for $50 million.
Google said the deal will “complement” its Google Cloud efforts for a fully managed IoT service.
“With the addition of Xively’s robust, enterprise-ready IoT platform, we can accelerate our customers’ timeline from IoT vision to product, as they look to build their connected business,” Google wrote in a blog post announcing the acquisition.
Source: Google acquires LogMeIn’s Xively IoT platform for $50 million | ZDNet
After years of worry, the long-anticipated backlash to the changes wrought by the Internet of Things may finally be arriving. That could be a good thing.
As pretty much everyone knows, the Internet of Things (IoT) hype has been going strong for a few years now. I’ve done my part, no doubt, covering the technology extensively for the past 9 months. As vendors and users all scramble to cash in, it often seems like nothing can stop the rise IoT.
Maybe not, but there have been rumblings of a backlash to the rise of IoT for several years. Consumer and experts worry that the IoT may not easily fulfill its heavily hyped promise, or that it will turn out to be more cumbersome than anticipated, allow serious security issues, and compromise our privacy.
Source: Is the IoT backlash finally here? | Network World
It was a peaceful day in the international company’s computer operations centre until, at 13.07, the monitoring services detected that there were several simultaneous attempts to probe a non-existent workstation. Four minutes later, a VHDL server attempted to access a Google search. And, four minutes after that, external friends confirmed that they were seeing potential broadcasts from the company to known bad sites. (External friends are other companies who mutually monitor sites.) At 13.20 – 13 minutes after the first recorded incident – instructions were issued that all the company’s sites should close down their IT activities. By 13.25 all external connections, including landline telephones, were closed down and all named machines were locked down. By 13.40 all on-site networks and machines were shut down – including printers and other intelligent peripherals – and remote users were being instructed to shut down. At 13.45 all the named representatives of a pre-defined Incident Response Team (IRT) left their remote sites for the central location and by 15.50 it was clear that all remote users were shut down.
Source: A Tale to Make Your Blood Run Cold | EEJournal
Internet of Things product manufacturers must get their act together and secure their devices or they risk creating new ways for wrongdoers to commit crimes, a senior police officer has warned.
“All new technologies, all changes in the way that society is ordered — particularly if it is technology — always has a crime harvest. So, when cars were invented, people started drink-driving and stealing cars and it’s exactly the same with the Internet of Things,” said chief constable Michael Barton, head of the Durham Constabulary.
Source: An Internet of Things ‘crime harvest’ is coming unless security problems are fixed | ZDNet
Everyone’s heard of the IoT – smart thermostats, Internet-connected refrigerators, connected lightbulbs – but there’s a subset called industrial IoT that has a much more significant day-to-day impact on businesses, safety and even lives.
The term IIoT refers to the Industrial Internet of Things. In broad strokes, it’s the application of instrumentation and connected sensors and other devices to machinery and vehicles in the transport, energy and industrial sectors.
Source: What is the Industrial IoT? And why the stakes are so high | Network World
With the growth of connected devices and the internet of things, consumers must adopt simple steps to help keep themselves cyber secure.
By the end of this year, there will be more than eight billion internet of things (IoT) devices connected worldwide, according to analysts Gartner – from electricity meters to smart fridges.
Many families buy such gadgets without imagining they might pose a security risk, but they still tend to be less well-secured than devices such as PCs. This means that families should be careful both when choosing and setting up their IoT devices, according to Det Insp Mick Dodge, National Cyber PROTECT coordinator with the City of London Police.
Source: Is cybersecurity keeping up with the internet of things? | The Telegraph
Internet of Things products are notorious for their cybersecurity vulnerabilities, and data protection protocol is struggling to keep pace with innovation demand. With the best will in the world, IoT networks cannot be secured without the tools for the job – yet Forrester has found half of tech security leaders do not have sufficient tools for enforcing policies.
Data privacy is undoubtedly top of the agenda for IT security professionals and recent research findings confirmed this, with 92% of respondents confirming they have security policies in place for managing IoT devices.
Source: How do you solve a problem like Internet of Things platform security? | Computer Business Review
The Internet of Things (IoT) has started to move to the mainstream in enterprises across all industries. With IoT spending set to increase by 15 percent to reach $772.5 billion by the end of 2018, the coming year will undoubtedly bring further growth in the number of connected devices and enterprise IoT projects. More importantly, I believe that in 2018 enterprise IoT projects will finally move beyond merely automating existing business processes, to truly transforming industries by creating entirely new revenue streams and business models. This will be due in part to the concurrent rise of synergistic technologies such as artificial intelligence (AI) and fog computing, as well as an industry-wide move toward greater interoperability, standards and collaboration.
Source: 5 predictions for the Internet of Things in 2018 and beyond | Network World