Welcome!

Related Topics: @ThingsExpo, Mobile IoT, Cloud Security

@ThingsExpo: Blog Feed Post

IHS Predicts IIoT Cybersecurity Will Increasingly Be Implemented in Hardware | @ThingsExpo #IoT

Developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks

IHS Predicts IIoT Cybersecurity Will Increasingly Be Implemented in Hardware
By Sam Lucero

IIoT & Cybersecurity
As IIoT systems create ever more critical dependencies in plant, energy infrastructure, and transportation environments, developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks.

Although the use of secure processors in smartcard applications, such as bank cards, mobile phone SIM cards, and digital ID documents is common, IIoT developers have barely begun to adopt a hardware-enabled approach. Instead, “root of trust” technologies, such as secure key storage, cryptography, and secure boot, are handled in software on the main application processor of the device. IHS estimates that in 2015 only 9.8% of all secure processors shipped were intended for IoT applications (that is, all of IoT, not just IIoT).

The challenge with this software-based approach is that security functions on the application processor share common memory resources with other functions and are therefore exposed and vulnerable to malicious attack. Hardware isolation reduces (but cannot completely eliminate) this exposure and therefore dramatically increases the security of the device. This increased security is fundamentally why bankcards, mobile phones, and now ePassports, have shifted to the use of hardware-based security.

Looking Ahead
A lingering question regarding the use of secure processors in IIoT applications is whether implementation will be in the form of a second coprocessor chip placed alongside the host application processor, or whether cybersecurity hardware intellectual property will be integrated directly into an application processor. (Integration of cybersecurity circuitry still achieves hardware isolation in contrast to software, although some physical security measures may become impractical.)

Chip companies such as Atmel, NXP, and Renesas Electronics have adopted this integrated approach for at least some of their respective portfolios targeting the IoT. It remains to be see whether an integrated approach will be successful. While integration helps to reduce overall device bill-of-materials, it can increase cost and complexity for cybersecurity certification, relative to a “two-chip” solution.

About Sam Lucero
Sam Lucero is a seasoned industry analyst with over 14 years of experience analyzing telecommunications and networking technology markets. He has spent the last ten years assessing the markets for machine-to-machine (M2M) and Internet of Things (IoT) applications. Sam has established leading M2M market research programs and managed international teams of industry analysts. He has authored numerous reports, forecast databases, and topical articles covering various aspects of the M2M/IoT market opportunity and has been widely quoted in news and trade journals, from the New York Times and the Economist to CNET and Wireless Week. Furthermore, Sam has moderated, presented, and judged at a number of industry events, including CTIA and Connected World. In 2014 Sam was named one of six “Augural Analysts” for M2M by Connected World Magazine.

The post Guest Post: IHS Predicts IIoT Cybersecurity Will Increasingly Be Implemented in Hardware appeared first on FreeWave WaveLengths.

Read the original blog entry...

More Stories By Scott Allen

Scott is an executive leader with more than 25 years of experience in product lifecycle management, product marketing, business development, and technology deployment. He offers a unique blend of start-up aggressiveness and established company executive leadership, with expertise in product delivery, demand generation, and global market expansion. As CMO of FreeWave, Scott is responsible for product life cycle/management, GTM execution, demand generation, and brand creation/expansion strategies.

Prior to joining FreeWave, Scott held executive management positions at Fluke Networks (a Danaher Company), Network Associates (McAfee), and several start-ups including Mazu Networks and NEXVU Business Solutions. Scott earned his BA in Computer Information Systems from Weber University.

Latest Stories
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development organizations.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...