Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Slideshows

1/24/2020
01:30 PM
Curtis Franklin Jr.
Curtis Franklin Jr.
Edge Slideshows
100%
0%

7 Steps to IoT Security in 2020

There are important steps security teams should take to be ready for the evolving security threats to the IoT in 2020.

Mind the Edge
'With the increase in edge computing and distributed sensor networks, cloud infrastructure and edge devices are an increasingly attractive target,' says Jack Mannino, CEO of nVisium. The key to keeping the edge devices out of the grasping reach of attackers, he says, is to bring a hybrid approach to solving the problem.
'Edge computing requires a hybrid cloud approach, where the edge devices and cloud services must establish trust at each layer,' Mannino says. And deciding on how that trust will be established and be part of the business process flow begins with a detailed analysis of how the edge device generates data, what kind of data it generates, and the process by which the data is transferred to the rest of the application infrastructure.
Just as traditional IT attackers often choose users as their way into a network, those who want to breach your IoT may see edge devices as hosting the easiest ports of entry. Don't let your focus on the rich, creamy center of the network keep you from paying attention to the often-brittle devices out at the edge.
(Image: denisismagilov via Adobe Stock)

Mind the Edge

"With the increase in edge computing and distributed sensor networks, cloud infrastructure and edge devices are an increasingly attractive target," says Jack Mannino, CEO of nVisium. The key to keeping the edge devices out of the grasping reach of attackers, he says, is to bring a hybrid approach to solving the problem.

"Edge computing requires a hybrid cloud approach, where the edge devices and cloud services must establish trust at each layer," Mannino says. And deciding on how that trust will be established and be part of the business process flow begins with a detailed analysis of how the edge device generates data, what kind of data it generates, and the process by which the data is transferred to the rest of the application infrastructure.

Just as traditional IT attackers often choose users as their way into a network, those who want to breach your IoT may see edge devices as hosting the easiest ports of entry. Don't let your focus on the rich, creamy center of the network keep you from paying attention to the often-brittle devices out at the edge.

(Image: denisismagilov via Adobe Stock)

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio

Previous
2 of 8
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Flash Poll