Menu

IoT FEATURE NEWS

Risk Assessment, Sharing are Key to Optimal IoT Security, Panel Says

By Paula Bernier August 18, 2015

When it comes to the Internet of Things, the appropriate level and type of security depends upon the application and the risk involved should that data or asset be hacked.

Tim Hahn, distinguished engineer at IBM, noted that he uses a different quality of lock on his home than he would in a bank. The same thinking can be applied relative to security and the IoT, he indicated. Here, he emphasized the importance of assessing risk by understanding what you want to protect and the value of it.

“We will never thwart all the attacks,” he noted, so it’s best to understand there will always be another attack, and to prepare for it in the most appropriate way possible.

That advice could apply to any kind of security scenario, of course, but Hahn and his fellow panelist Godfrey Chua of Machina Research, noted that the IoT has what they called amplified attack surfaces. Hahn and Chua were panelists at the IoT Security Summit, which took place yesterday at the IoT Evolution Expo, which runs until Thursday at Caesars Palace.

Image via Shutterstock

Hahn said he already has 30 or 40 connected devices in his home. During the same session, Chua presented a slide of a car with an array of labels that pointed out connected and software-based functions.

Chua went on to say that given the complexity of putting together an IoT deployment, there is no one company that can do it all. So it’s important, he said, to work with your network partnership ecosystem to understand all aspects of security.

Perhaps BMW would have benefitted from such sharing. Chua said the company was hacked nearly two years ago. Although the company was diligent about security, he said, it used an encryption technology that was known to be vulnerable, but didn’t realize it was using a technology that already had been compromised.




Edited by Dominick Sorrentino

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

IoT Time Podcast S.2 Ep.33 Trusted Computing Group

By: Ken Briodagh    6/22/2017

On this episode of the IoT Time Podcast, Ken Briodagh sits down with Steve Hanna, chair of TCG's embedded systems and IoT work groups, and principal a…

Read More

IoT Time Preview: The Cloud

By: Ken Briodagh    6/22/2017

In this weekly series, we'll be previewing chapters of "IoT Time: Evolving Trends in the Internet of Things" for you to read in the hopes that you'll …

Read More

IoT Evolution Speakers: Lee Gruenfeld Speaks Out

By: Ken Briodagh    6/22/2017

Lee Gruenfeld is Managing Partner of the Cholawsky & Gruenfeld SaaS/IoT consulting firm, and is a Principal with the TechPar Group in New York, a bout…

Read More

IoT Evolution Speakers: Jeff Liebl Speaks Out

By: Ken Briodagh    6/22/2017

Jeff Liebl is President of Anaren IoT Group, which designs, manufactures and sells custom high-frequency solutions and standard components for the wir…

Read More

IoT Evolution Speakers: Israel Alguindigue Speaks Out

By: Ken Briodagh    6/22/2017

Israel Alguindigue is SVP, Industrial Practice, Uptake, a developer of products that solve industry pain points and enable new data-driven business mo…

Read More