IoT/TcoT security

IoT/TcoT security

When I read topics of interest in the market I always view them with a grain of salt…but without a doubt IoT is booming but it has been booming for the last 6 years most people don't see the work that has gone in.

6 May 2000 due to the  (  ILOVEYOU worm ) we where asked to protect the  Desktop then the laptop now anything that moves..but the true collaborate of IoT is still the OS ( Operating System ) an Applications…or is it?

For example today I protect my fridge from hackers in my house an my kids roam with there IPADs an my home automation system gets hit on a weekly bases from China an Brazil..Still don't understand what there is to steel from my fridge unless you want my wife's Flan recipe .. or you want my pictures of me in the Camp NOU with Messi where is the weakness in these Devices

TcoT ( The connection of things ) so when I’m looking at my firewall an seeing this threats come in they don't want to plant a virus they want access to my banking details my iCloud an Google accounts why? there isn't Money in the fridge,,, But this sure is the next wave of Ramsonware being tested to own the consumer.

But the consumer isn’t the only one with an issue…no big business will own the bulk of the threat as TcoT is deeper reaching within business as most devices are dumb terminals to a smart backend ( Mainframe 4.0 )..eg things like POS devices ( Point of sale ) an ATM machine  ( Automated Teller Machines ) Road Toll device’s an Air Conditioner automation system to name a few..

So the solution needs a Single Pane of inline security as the perimeter has moved to TcoT ( The connection of Things ) point solutions with the lack of propagation protection & communication an forensic auditing will not cut it in the real world of IoT/TcoT

The IoT Market …$$$$$$$$$$

The evolution of connected devices as nodes on the Internet of Things (IoT) brings limitless possibilities. As more and more everyday things are connected to the Internet — medical devices, automobiles, homes, etc. — the long-term forecast for the IoT is staggering: By 2020, there will be 212 billion installed things, 30 billion autonomously connected things and approximately 3 million petabytes of embedded system data, all of which are expected to generate nearly $9 trillion in business value.

Charlotte Samuels

Cybersecurity Leader

9 年

brilliant article!

要查看或添加评论,请登录

Oscar Marquez的更多文章

  • Weaponized fake News

    Weaponized fake News

    The weaponized fake news reports deploy malware that can infiltrate the target’s entire network or company. Eventually,…

    1 条评论
  • The Social HATE Movement

    The Social HATE Movement

    So the longer I live in the US an see the amount of hate on social media from the right or the left..

    1 条评论
  • The top 5 security issues from the “Internet of Things”

    The top 5 security issues from the “Internet of Things”

    The internet of things or the internet of insecure things is a rapidly growing monster that seems to have taken over…

  • Understanding ALL of Ransomware’s costs

    Understanding ALL of Ransomware’s costs

    It is not a rumor that Ransomware is making a popular comeback in the hacking industry. Having that pop up come across…

  • Is BYOD Infecting Your Company?

    Is BYOD Infecting Your Company?

    Many organizations have implemented a Bring Your Own Device policy within their companies. With so many people using…

  • Is Adobe Flash still a vulnerability?

    Is Adobe Flash still a vulnerability?

    Adobe Flash has been popular since it was first released 20 years ago. The freeware software was used for a multitude…

    1 条评论
  • Next Gen firewall- overpromised and under delivered

    Next Gen firewall- overpromised and under delivered

    The NGFW (Next Generation Firewall) was supposed to be a one stop shop solution for all your threat prevention needs…

    3 条评论
  • Cyber insurance; what does it cover?

    Cyber insurance; what does it cover?

    As a security professional, you are taught what to do in case of a data breach. You know who to contact, steps to take…

  • Using Sandboxes? Beware of False Positives

    Using Sandboxes? Beware of False Positives

    Sandboxing can be a valuable resource to any security team that puts the time and resources into it. If not, returning…

  • Finance and Cyber Security: What You Need to Know

    Finance and Cyber Security: What You Need to Know

    There has been an increased threat of cyber-attacks, and cybersecurity experts expect these trend tocontinue in the…

社区洞察

其他会员也浏览了