A Shift in IoT Security?

Has the earth shifted a little and I missed it? I’ve just seen the promotions for HP's new LaserJet printers. https://www8.hp.com/us/en/business-solutions/security/secure-printing.html?jumpid=va_g5ud2rj7a6

HP is trying to convince us to buy their printers because they have security features. Lets ignore for a minute any discussion of the merits of the methods they are using to secure the devices. To me the significant thing is that they are promoting security features.

This is big. They must feel that these features will help them sell printers. And given the stat from the ad – that 53% of IT managers realize printers are vulnerable to cyber crime - I can see why they think so. The proof will be if buying decisions actually get made based on these features. If so, it will force other manufactures to respond by building in security to their devices. We may, just may, see some security sanity come to the IoT space. I sure hope so.

If it doesn’t, we’ll continue down this road where no one bothers to build security into IoT devices. And things will not look pretty. So it’s nice to have hope.

Any other IoT manufactures promoting security features in their devices that I may have missed?

Brian Malby

The Airman who became a Sailor

9 年

It's a start, for sure. Time will tell if there is an increased commitment to security in IoT devices or if this is simply a marketing gimmick. Let's hope security doesn't become the new oat bran.

回复

Kevin - i agree that we are seeing the leading edge of a change in how security is viewed. Indeed "Secure by Design" is going to be an imperative across all kinds of devices. The devil will of course be in the details. Note that the security push for IoT is actually beginning with the chip makers - INEDA SYSTEMS, Atmel Corporation and Freescale Semiconductor all tout their security capabilities. I believe though that we have to go beyond that and begin addressing security from a system-wide perspective. But its a good start. The hard task is now convincing embedded application developers and product architects to have a "security first" approach.

回复

Kevin, I agree that the tide is turning. I see 2016 as the year when IoT manufacturers move from asking "why security" to asking "how do I protect my devices". At INSIDE Secure we published the Dummies guide to IoT Security to help them on their journey: https://www.insidesecure.com/IoT-Security-for-Dummies-guide

回复
Steve Hoffenberg

RETIRED. Former Industry Analyst; Director of IoT & Embedded Technology at VDC Research; former CISSP

9 年

An even bigger shift will be when consumer product vendors start touting their security features. But I'm not holding my breath for that to happen any time soon.

回复
Timmy Mooney

At Optiv, we manage cyber risk so you can secure your full potential.

9 年

Kevin Haley: it is the lack of security on IoT and SCADA devices that Attivo Networks, Inc. decided to fast-track support for these devices on our BotSink deception platform. Very exciting to provide to our customers one platform that can protect a company’s intellectual and networked physical assets!

回复

要查看或添加评论,请登录

Kevin Haley的更多文章

  • The NSA Speaks

    The NSA Speaks

    The NSA speaks. Not about the latest contractor to steal data from them.

  • Fear and Loathing of IoT

    Fear and Loathing of IoT

    I never had to fear my VHS recorder. It sits under my bed now, gathering dust, in case I decide I really need to play…

    3 条评论
  • Get Out Of My Head

    Get Out Of My Head

    A house has always been a great analogy for explaining computer security. If you don’t lock your doors and windows it’s…

  • Evil Maid

    Evil Maid

    When a big company gets breached it makes the papers. Everyone knows about it.

    1 条评论
  • HACKING HOLLYWOOD: THE INAUGURAL SYMMY AWARDS

    HACKING HOLLYWOOD: THE INAUGURAL SYMMY AWARDS

    For the past decade, we’ve seen cyber security and hacking starting to play a big role in entertainment. Countless…

    2 条评论
  • To Pay Or Not To Pay

    To Pay Or Not To Pay

    To pay or not to pay… with ransomware that is the question. You’ve heard of others who have gotten their files back by…

    2 条评论
  • Canary or a Goat?

    Canary or a Goat?

    Would you rather be a Canary or a Goat? That question sounds like an ice breaker at a group encounter session. I have…

    2 条评论
  • "I'm Sick Of Talking About Best Practices!"

    "I'm Sick Of Talking About Best Practices!"

    "I'm sick of talking about best practices". That’s what I was told recently.

    5 条评论
  • Ransomware is like the Black Plague

    Ransomware is like the Black Plague

    Ransomware is like the Black Plague. Once infected you have the equivalent of a big X on your door - here it’s a ransom…

    2 条评论
  • A Grade

    A Grade

    A company you’ve done business with has been breached. Your information has been stolen.

    3 条评论

社区洞察

其他会员也浏览了