Register to receive our newsletter and join in the conversation on our message boards!
REGISTER NOW
Comments
Newest First | Oldest First | Threaded View
faryl
faryl
12/29/2016 11:06:58 PM
User Rank
IoT Visionary
Re: Autobots
That's a smart idea. I think I may have to implement that here this week!

100%
0%
faryl
faryl
12/29/2016 11:05:20 PM
User Rank
IoT Visionary
Re: put an end to default usernames and passwords?
Especially since consumers seem so largely unaware they exist. Cox doesn't even provide instructions on how to change your wifi password, much less let customers know their router is configured with a password too. It seems almost irresponsible to install routers with default passcodes like that.

50%
50%
Michelle G
Michelle G
12/27/2016 10:27:35 AM
User Rank
IoT Visionary
Re: Autobots
@dcawrey I read that home users should absolutely assign a separate guest network to IoT devices to keep them from accessing other devices on the network. I assume this is a good strategy for larger applications as well. Keeping IoT separate from other networked machines is probably a good start.

50%
50%
dcawrey
dcawrey
12/26/2016 11:23:07 PM
User Rank
IoT Visionary
Re: Autobots
@Michelle G There has to be solutions out there. One thing I was thinking of the other day: What if there were containerized IoT devices? Would that be possible? I think that might be able to help IoT deployments go faster and provisioning more efficient. 

50%
50%
Michelle G
Michelle G
12/21/2016 2:58:30 PM
User Rank
IoT Visionary
Re: Autobots
@dcowrey That could be an option. I hope a viable solution is found ------ and soon. We're seeing early stage attacks that will only get worse (and more sophisticated). 

50%
50%
Michelle G
Michelle G
12/21/2016 2:56:29 PM
User Rank
IoT Visionary
Re: Autobots
@mhhf1ve You're right about liability -- that would never work. Security first should have been part of the development model for infected devices. The sad truth is that security is often left to the very end or skipped all together. 

50%
50%
dcawrey
dcawrey
12/20/2016 7:07:43 PM
User Rank
IoT Visionary
Re: Autobots
This is some scary stuff. I think one of the things IoT device makers need to focus on is making sure there are proper provisioning systems in place to make sure things like configurations and password can be easily changed at a large scale. That should at least help this problem. 

50%
50%
mhhf1ve
mhhf1ve
12/19/2016 6:59:28 PM
User Rank
IoT Visionary
put an end to default usernames and passwords?
Seriously, isn't it time to put an end to default passwords? There must be some way to make sure that devices can be reset easily (a hardware dongle, perhaps?) without resorting to a default password....

50%
50%
mhhf1ve
mhhf1ve
12/19/2016 6:57:20 PM
User Rank
IoT Visionary
Re: Autobots
Perhaps if there was some liability for manufacturers if their devices are easily infected with malware...? Nah, that would never happen because almost any device could be infected, and the liability scare would shut down almost every new product.

Is there any way to stop IoT devices from being infected from malware?

Save us, blockchain of things, you're our only hope.... 

50%
50%
Michelle G
Michelle G
12/18/2016 6:43:19 PM
User Rank
IoT Visionary
Autobots
I didn't realize Mirai scanned so frequently to find vulnerable devices. I can see how protecting IoT devices becomes more difficult. Maybe we'll get really lucky and an Autobot (or a Terminator) will save us from our infected devices.

100%
0%


Latest Articles
In Gothenburg more so than other burgeoning smart cities, silos are seen as the enemy. And no one knows this better than Ann-Louise Hohlfält, urban development officer for the City of Gothenburg.
Virtual reality and augmented reality remain nascent technologies, but Mastercard is already working on its plans to leverage them as they anticipate mass adoption among consumers.
We speak with Rinat Guy, CIO for the Municipality of Israel's award-winning smart city.
Industrial internet leader Bosch tells us about the IoT power tool products their working on & how long until these solutions hit the mass-market.
Our interview with Boeing Senior Systems Engineer Robert Rencher reveals that aviation IoT has implications for digital factories and supply chains, but its the operational environment where the biggest inroads will be made.
Upcoming Live Events
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Santa Clara Convention Center
May 16-18, 2017, Millennium Gloucester Hotel, London
June 13-15, 2017, ExCeL, London
June 13-15, 2017, ExCeL, London
All Upcoming Live Events
Flash Poll
Video
Wilhelm Nehring, CEO of ThyssenKrupp Elevator UK, talks through his favorite applications of IoT in buildings and cities with IoT World News.
David Holecek, Director of Connected Products & Services at Volvo Car Group , speaks with IoT World News on Volvo's moves in the connected car ...
Liat Ben-Zur, SVP and digital technology leader at Philips, describes the plethora of ways IoT will be used to transform healthcare via hospitals, ...
Richard Corbridge, CIO at Health Service Executive, explains how IoT is already impacting digital healthcare in Ireland and where he sees the ...
Mimmis Cleeren, Global Director of marketing (IoT BU) at MediaTek, covers some of the special IoT projects that have emerged from MediaTek's ...
All Videos
Webinars
ARCHIVED
Tuesday, March 14, 2017
1:00 p.m. EST

Identifying and solving the practical security challenges encountered by businesses embarking on an Internet of Things deployment.

Realizing your company's IoT vision starts with connecting and securing your infrastructure. IoT infrastructures require organizations to collect and transmit commands and data from devices, applications and people -- securing all of this is a sizeable challenge.

Our expert panelists will identify and solve the key issues that arise during this process, enabling a safe and steady beginning to your organization's IoT journey.

The webinar will cover:

  • Identity Issuance: Security at Scale
  • Identity Management: Authentication and Authorization
  • Identity and Data Security: Data Integrity and Granular Policy Definition

Webinar attendees will learn:

  • How to ensure that data is only accessed by authorized devices, applications and users in an IoT setting
  • Methods for transmitting data from devices in the field to value engines securely and efficiently
  • Best practice for implementing tried-and-trusted IoT ecosystems and safeguarding data flow across your company's entire infrastructure
  • How to create a holistic and protected IoT ecosystem for your company

Information Resources
All resources
Twitter Feed
like us on facebook
IoT World News
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2017 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Terms of Use
in partnership with