10 Nov Edge Device Security in the Internet of Things
Episode 49
Whether the Internet product is a discrete product, a system or infrastructure, more often than not, its end nodes are sitting in the wild – just waiting for a bad actor to get their hands on them. This physical accessibility introduces a new category of attack surfaces that need to be protected against.
In IoT, it’s challenging enough to be concerned with network security, but you must also concern yourself with mobile security, application security, cloud security and system security. Beyond that, end nodes are often exposed, available to be prodded and probed, forcing you to consider physical security and in case that fails, firmware security. That coupled with the end node’s SWaP (size, weight and power) constraints makes securing these devices a handful. Luckily, like with all security, there are best practices that can drastically reduce the success of an end node breach.
Here’s What We’ll Cover in this Video:
- How the lack of a UI introduces new challenges in cybersecurity.
- Vera’s top three tips for firmware security.
- The shortcomings of most security monitoring systems.
- Why deep packet inspection can fall short in IoT.
- The problems with using micro segmentation as a security mechanism.
Watch this video to see Vera Sell discuss edge device vulnerabilities in the Internet of Things and the best practices to follow to secure them.
Mentioned in this Episode and Other Useful Links
Have an opinion? Join the discussion in our LinkedIn group
What challenges have you found in security your edge devices?
Click here if you have an opinion on this video or want to see the opinions of others