create account

Managing IoT Data SECURITY RISKS by mrosenquist

View this thread on: hive.blogpeakd.comecency.com
· @mrosenquist ·
$2.30
Managing IoT Data SECURITY RISKS
<html>
<p><img src="https://i.postimg.cc/sXpj6v0S/The-Need-to-Secure-Data-in-Modern-Computing-X700.png"/></p>
<p><a href="https://eclipz.io/managing-iot-data-breaches#mid-header"><strong>We are surrounded! </strong></a><strong> </strong>Smart devices are everywhere and being integrated into all facets of our lives, from toothbrushes to automobiles. Entire cities are becoming ‘smart’, as are factories, governments, global retail, freight logistics, and all national critical infrastructure sectors. As individuals, we are becoming hubs for multiple connected devices in our homes and on our persons. Phones, watches, health monitors, medical devices, and clothing manufactures have joined in to develop connected apparel and accessories. Cameras, doorbells, appliances, televisions, thermostats, voice assistants, and light fixtures are just the beginning of the digitalization of our homes.  These wonderful tools of the modern world, some no bigger than a coin, provide amazing capabilities and tremendous convenience; they connect and enhance our lives in amazing ways.</p>
<p>Unfortunately, they also introduce equitable risks. The aggregated risks from all the Internet-of-Things (IoT) devices, now approaching 50 billion in number, adds up to a big problem for everyone. </p>
<p>Sadly, the dark secret is that IoT and their close cousins Industrial IoT (IIoT) devices which we typically embrace, are very insecure. These systems are notoriously hackable; the data they create and share is often vulnerable to exposure, and the devices themselves can be leveraged as a platform by attackers to target more important systems in our lives. IoT insecurity represents one of the next great challenges for the technology industry that is struggling to preserve the trust of consumers from cyber threats which are easily finding ways to undermine the security, privacy, and safety of users.</p>
<p>Most IoT devices are miniature and very limited when it comes to the computing resources necessary for secure capabilities. It is difficult to know who owns or possesses them, if they have been hacked, and if they are acting in undesired ways. This makes IoT devices not very trustworthy. To compound the problem, IoT devices tend to share data over insecure networks like wireless and the Internet. This mix is a recipe that cybercriminals and hackers enjoy.</p>
<p>The functional backbone for IoT devices is all about gathering, processing, and sharing data. One of the primary challenges is to protect the data going to and emanating from the devices. Legacy technology largely fails when it comes to secure communications at this scale and difficulty. More comprehensive, effective, and sustainable capabilities are needed to keep pace with evolving threats.</p>
<p>Connecting IoT technologies to share data securely is difficult. Some standards exist for specific use-cases, such a web browsing, but most of the emerging IoT devices and services require a synthetization of architectures, algorithms, and compatibilities that current solutions don’t satisfy. That is why we are seeing a flood of IoT compromises and the future advances of hackers will only increase the victimization unless something extraordinary happens.</p>
<p><strong><em>Where there is innovation leadership, hope survives.</em></strong></p>
<p>Protecting digital data is important for everyone. Andy Brown, CEO of Sand Hill East, and I penned a joint article <a href="https://eclipz.io/managing-iot-data-breaches#mid-header">Managing IoT Data Breaches</a>, that was published in the Sept 2020 issue of Cybersecurity Magazine, describing the scale and complexity challenges of IoT data protection. Innovation is needed to safeguard data in the new digital landscape!</p>
<p><br/></p>
<p>After 30 years in the industry, I anticipated the future needs and realized the upswell of insecure devices would put everyone at risk if sensitive data could not be protected. I joined the <a href="https://eclipz.io/about">Eclipz team</a> as an <a href="https://eclipz.io/iab">Advisory Board</a> member to help advance and tailor the greatly needed capabilities into the commercial market for everyone’s benefit. The Board of Directors asked that I join a stellar executive team as the CISO to further help empower the best technology to make devices and the global digital ecosystem more trustworthy. </p>
<p><a href="https://eclipz.io/">Eclipz</a> is an elegant and robust capability to connect untrusted endpoints across insecure networks in ways that protect data from current and evolving threats. Eclipz is not a product unto itself, but rather an architecture and code integrated into everyday products and services, empowering them to communicate securely. That makes it ultimately scalable. It can be applied to protect a vast array of devices, infrastructures, and experiences across every market, making the technology and services people use more secure by protecting the flows of data. The explosion of IoT devices poses one of the greatest attack surfaces ever known and must be better secured. Eclipz technology can strengthen the foundations of IoT ecosystems for the benefit of the global digital community.</p>
</html>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
properties (23)
authormrosenquist
permlinkmanaging-iot-data-security-risks
categorycybersecurity
json_metadata{"tags":["cybersecurity","technology","data","internet","iot"],"image":{},"links":{},"app":"hiveblog/0.1","format":"html"}
created2020-11-24 17:35:48
last_update2020-11-24 17:35:48
depth0
children5
last_payout2020-12-01 17:35:48
cashout_time1969-12-31 23:59:59
total_payout_value1.324 HBD
curator_payout_value0.975 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length5,201
author_reputation162,999,161,348,293
root_title"Managing IoT Data SECURITY RISKS"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id100,667,657
net_rshares13,462,216,189,820
author_curate_reward""
vote details (52)
@joebrochin ·
Excellent article. Would a good use case for Eclipz be for systems that are standalone due to their running obsolete OS's or running outdated applications?
👍  ,
properties (23)
authorjoebrochin
permlinkre-mrosenquist-qkdgst
categorycybersecurity
json_metadata{"tags":["cybersecurity"],"app":"peakd/2020.11.2"}
created2020-11-25 21:53:24
last_update2020-11-25 21:53:24
depth1
children1
last_payout2020-12-02 21:53:24
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length155
author_reputation26,155,480,658,381
root_title"Managing IoT Data SECURITY RISKS"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id100,685,741
net_rshares81,873,324,017
author_curate_reward""
vote details (2)
@mrosenquist ·
Eclipz is designed to establish a secure connection with untrusted endpoints over an insecure network via an encrypted IP tunnel.  It is establishes end-to-end encryption.  It can work for many use-cases.
👍  ,
properties (23)
authormrosenquist
permlinkqke76b
categorycybersecurity
json_metadata{"app":"hiveblog/0.1"}
created2020-11-26 07:23:00
last_update2020-11-26 07:23:00
depth2
children0
last_payout2020-12-03 07:23:00
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length204
author_reputation162,999,161,348,293
root_title"Managing IoT Data SECURITY RISKS"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id100,690,641
net_rshares100,642,275,110
author_curate_reward""
vote details (2)
@josevas217 ·
Hello @mrosenquist
It really is an explosion of technology use since some years ago, but what many don't take into account is that important aspect of security. We're very easily exposed if we don't know about it.
You have made a good contribution to the platform with this information, and surely later you will be able to share more valuable information about it. I'll keep an eye out
👍  ,
properties (23)
authorjosevas217
permlinkqkbb6h
categorycybersecurity
json_metadata{"users":{},"app":"hiveblog/0.1"}
created2020-11-24 17:56:48
last_update2020-11-24 17:56:48
depth1
children1
last_payout2020-12-01 17:56:48
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length386
author_reputation314,334,361,523,029
root_title"Managing IoT Data SECURITY RISKS"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id100,667,955
net_rshares122,829,123,542
author_curate_reward""
vote details (2)
@mrosenquist ·
Thanks for the comment @josevas217  I do post a lot on cybersecurity issues.  It is my 'thing'.
properties (22)
authormrosenquist
permlinkqkdb4e
categorycybersecurity
json_metadata{"users":{},"app":"hiveblog/0.1"}
created2020-11-25 19:50:39
last_update2020-11-25 19:50:39
depth2
children0
last_payout2020-12-02 19:50:39
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length95
author_reputation162,999,161,348,293
root_title"Managing IoT Data SECURITY RISKS"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id100,684,183
net_rshares0
@ultimus ·
$0.05
A flood of data is being created!
👍  
properties (23)
authorultimus
permlinkqkbal3
categorycybersecurity
json_metadata{"app":"hiveblog/0.1"}
created2020-11-24 17:43:51
last_update2020-11-24 17:43:51
depth1
children0
last_payout2020-12-01 17:43:51
cashout_time1969-12-31 23:59:59
total_payout_value0.024 HBD
curator_payout_value0.025 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length33
author_reputation6,203,514,527,879
root_title"Managing IoT Data SECURITY RISKS"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id100,667,772
net_rshares409,538,248,269
author_curate_reward""
vote details (1)