Integrating security into IoT projects is not easy, but it’s increasingly urgent

By | 10:34 PM Leave a Comment

With an installed base of 44 billion connected devices projected for 2023, the amount of data and information generated and shared will reach zettabytes of data, according to ABI Research.

integrating security into IoT

“Much of that data will be sensitive, whether about an individual’s privacy or confidential business information. As such, it presents a lucrative opportunity for threat actors, as data has become a highly commoditized asset in modern societies.

“Add to that the potential of harnessing unprotected IoT devices for botnets, denial-of-service attacks, or even holding them hostage to ransomware, the imperative for security cannot be ignored,” emphasizes Michela Menting, Digital Security Research Director at ABI Research.

Several platforms and tools have emerged in the market recently, which can facilitate security implementation, even in the most basic IoT devices.

From a hardware perspective, many semiconductor manufacturers are offering secure microcontrollers that can service general-purpose IoT applications from smart home appliances to industrial control systems.

In a bid to facilitate secure IoT deployments, the semiconductors vendors offer a wide breadth of software development platforms, from their own proprietary solutions but also focusing on interoperability and compatibility with third-party software and connectivity tools.

The aim is to facilitate the use of secure hardware by providing secure software development and service connectivity tools that can easily allow developers to onboard and securely manage their devices.

“Developing and managing secure IoT deployments is no longer the remit of security professionals but is a capability that is quickly becoming available to developers of all levels.

“Enterprises looking to deploy IoT can now more easily engage in securing them, in a more cost-effective manner that can enable faster time-to-market. End-to-end IoT security is within reach for enterprises large and small,” Menting concludes.


from Help Net Security https://ift.tt/2Jt0tZ9

0 comments:

Post a Comment