broken image
broken image
GET IN TOUCH
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
broken image
broken image
  • HOME
  • SERVICES 
    • Educate and Alert
    • Secure By Design
    • Test and Certify
    • Automate
    • By Industry
  • STANDARDS & REGULATIONS 
    • ETSI EN 303 645
    • FDO IoT
    • IEC 62443
    • CC | EUCC
    • IoXt Alliance
    • FIDO
    • FIPS 140-3
    • EU Cloud Service
    • ISO 21434 & R155
    • EN 17640 | FITCEM | CSPN
    • CRA
    • RED-DA
    • MDR
    • SESIP
    • GSMA IoT
  • ABOUT US 
    • Who we are
    • EU Projects
    • They trust us
    • Careers
    • Knowledge
    • Contact
  • Blog & News 
    • Compliance & Regulations
    • Tech & Security
    • Industry Use Cases
    • Insights & Trends
    • Company News & PR
    • EU & Research Projects
  • …  
    • HOME
    • SERVICES 
      • Educate and Alert
      • Secure By Design
      • Test and Certify
      • Automate
      • By Industry
    • STANDARDS & REGULATIONS 
      • ETSI EN 303 645
      • FDO IoT
      • IEC 62443
      • CC | EUCC
      • IoXt Alliance
      • FIDO
      • FIPS 140-3
      • EU Cloud Service
      • ISO 21434 & R155
      • EN 17640 | FITCEM | CSPN
      • CRA
      • RED-DA
      • MDR
      • SESIP
      • GSMA IoT
    • ABOUT US 
      • Who we are
      • EU Projects
      • They trust us
      • Careers
      • Knowledge
      • Contact
    • Blog & News 
      • Compliance & Regulations
      • Tech & Security
      • Industry Use Cases
      • Insights & Trends
      • Company News & PR
      • EU & Research Projects
GET IN TOUCH
broken image

Improving the Security of IoT

One Recommendation at a Time

· Technical and Security Deep Dives,Industry Applications and Use Cases

There is sufficient knowledge today about the weaknesses of our IoT systems as well as some suggested ways to tackle them. However, most of these solutions have broader policy implications that we must take into account before we try to implement them.

It is a difficult task, owing to the multi-sectoral nature of the IoT industry and the supply chain itself. Still, it should be possible to improve the security of IoT, one recommendation at a time. Let’s have a closer look at the problem:

Enabling End-to-End Security

One of the critical weaknesses of IoT is the lack of end-to-end security that makes a system secure through its lifecycle. The fault persists because our current security standards are sometimes contradictory and don’t offer enough protection. Creating more standards will only further increase the problem if we don’t enable end-to-end security first. It is one of the priorities of IoT safety improvements.

Sector by Sector

Working on IoT security, sector by sector is proving to be a good practice, even though it’s less comprehensive than security experts would prefer. It has its challenges because each industry must also acknowledge that they don’t exist in a vacuum and that their supply chain is likely multi-sectoral. However, it’s possible to come to better cybersecurity solutions if every sector worked on this separately.

Sharing the Regulatory Burden

The regulatory burden is currently divided between public authorities and the private sector — and at times it seems that it’s not distributed as efficiently as it could be. Another issue is that there are many “soft” laws and regulations that the private sector only takes as guidelines that they don’t have to adhere to if a cost/benefit analysis says otherwise. These issues have to be addressed through a unified effort of the authorities and the private sector.

Cyber Risk Management of IoT

Cyber risk management is an attractive idea for IoT. However, even though it can improve through studying the human factor, these two approaches stand at odds when it comes to their overall philosophy. The study of social factors analyzes weaknesses and vulnerabilities after they’ve happened, while cyber risk management attempts to predict and address them before they come to be.

Improving Current Manufacturing and Designing Practices

Many IoT issues start at the source, as early as the design stage of the process. To address them, manufacturers and designers of IoT devices need to adopt the security-by-default and resilience-by-design mindset. It would help them come up with better security and resilience solutions that would be embedded right into the device. Both of these approaches have further implications for other common IoT issues such as liability and regulation, but they’re a step in the right direction.

One Recommendation At a Time

Improving IoT security is no easy task. It will require cooperation from a vast number of industries and policymakers. However, this effort can eventually ensure the cybersecurity of all of our IoT systems. Taking it one recommendation at a time is possible, as long as we understand what should come first.

Subscribe
Previous
Optimizing Investment to Minimize IOT Cyber Exposure
Next
IoT Security and Hospitality
 Return to site
Profile picture
Cancel
Cookie Use
We use cookies to improve browsing experience, security, and data collection. By accepting, you agree to the use of cookies for advertising and analytics. You can change your cookie settings at any time. Learn More
Accept all
Settings
Decline All
Cookie Settings
Necessary Cookies
These cookies enable core functionality such as security, network management, and accessibility. These cookies can’t be switched off.
Analytics Cookies
These cookies help us better understand how visitors interact with our website and help us discover errors.
Preferences Cookies
These cookies allow the website to remember choices you've made to provide enhanced functionality and personalization.
Save