The security of IoT devices relies on secure updates and cyber resiliency

To increase the resiliency of IoT devices from cyber-attacks, IoT manufacturers need to have a security-first approach and combine the latest updates and techniques, Sunil Cheruvu, Co-Chair of Trusted Computing Group’s (TCG) Internet of Things Work Group, said recently.

Speaking at the IoT Device Security Conference, Cheruvu stressed the importance of preparing the best response to inevitable cyberattacks. With the growth in the frequency and complexity of attacks, it is essential that devices are safe and uncompromised. Security must be a priority for all, not just when a disaster happens.

“A system is only as secure as its weakest link. To maintain the security and secure state of a device throughout its lifecycle, it is critical that the firmware and software on the device are updated to the latest version,” said Cheruvu. “With the sophistication of cyberattacks, threats are not always so easy to spot. Post update verification and attestation are essential for determining a reliable attestation from the device and ensuring all information is secure.”

As the number of IoT devices is set to reach 50 million by 2030, it is also important that security capabilities have an automatic way to recover a device to a trusted state, without requiring manual steps and interference. Ensuring cyber resiliency is essential to detect any compromise and provide reliable recovery to a trusted state for better protection.

To provide reliable attestations of devices, Cheruvu emphasised the importance of using the Trusted Platform Module (TPM) and Device Identifier Composition Engine (DICE). The TPM provides a standardized hardware Root of Trust (RoT) to help measure integrity and provide health checks and authentication services. For smaller devices, DICE provides device identity, integrity reporting, and data protection capabilities.

“As the deployment of IoT heightens in popularity, it is crucial that system developers deploy and adopt a variety of measures to ensure devices remain safe and secure throughout their lifetime. Cyberthreats are growing in frequency and complexity, the industry needs to be assured that there is a safe, secure future for all, where information remains protected, and systems remain online.”

Healthcare professionals at Portsmouth Hospitals University NHS Trust are trialling an AI application designed to help detect lung cancers on chest x-rays sooner, in the first UK project set up using the Sectra Amplifier Service.
More than eight out of ten respondents (84%) in Kaleido Intelligence IoT survey, sponsored by Eseye, cited hardware design as the top challenge for initial IoT deployments.
VMware is empowering Centrica in its mission to help customers live sustainably, simply, and affordably by providing better visibility into the company’s cloud-native applications running on Amazon Web Services (AWS).
Red Box, the leading platform for voice capture, and EvaluAgent, the all-in-one quality and performance management platform, have joined forces to enable call centre managers to access high quality voice conversations and transform quality assurance (QA) processes through automation.
BT’s Digital unit is partnering with Dynatrace, making it a core component of a new service management stack for BT Group.
This year's VMware State of Observability report notes an increase in organizations recognizing the business benefits modern observability can bring. Learn about that and other key findings.
New AI-ready infrastructure-as-a-service solution enables customers to deploy AI models and applications near critical data sets, addressing data localization and compliance challenges.
Juniper Networks has published the findings of a global research project that shows a big increase in enterprise artificial intelligence (AI) adoption over the last 12 months, which is yielding tangible benefits to organisations. However, a shortage of human talent still exists, and governance policies continue to lack in maturity – both of which are needed to responsibly manage AI’s growth when considering privacy issues, regulation compliance, hacking and AI terrorism.