Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementCybersecurity News

Cybersecurity and the Internet of Things

By Robert Muehlbauer
Fraud Cybersecurity Banking in Canada
August 27, 2019

Any IP-based device is part of the IoT, whether it’s a surveillance camera, door controller, loudspeaker or even a refrigerator. Most IoT devices offer non-proprietary and open standards that allow users to integrate them with other devices, systems and software without restrictions. This is where the true value of the IoT comes in, namely the data these devices generate, which can be mined and analyzed to provide deep insights and intelligence.

In order to be effective, IoT needs to have flexible data models, real-time triggers, be highly scalable, flexible open architecture, data visualization, device management, multi-connect support and end-to-end security.

Open standards allow devices from previously disparate categories to be used together and accessed via a single management console. This not only makes security and other systems easier to use but also provides enhanced situational awareness and overviews of incidents.

The Value of Data

Today, data is akin to oil in the 18th century: an immense, largely untapped, and very valuable asset. Also similar to oil, those who recognize the fundamental value of data and can learn to extract and use it, there will be tremendous rewards. Data on its own can be valuable but when analyzed to provide deeper insights and intelligence, it is even more valuable.

In our digital economy, data is the key to smooth functionality of everything from the government to small local companies. Without data, progress would grind to a halt. And the more sources of data you can mine, and the more data streams you can blend, the greater the value. Therefore, as more and more devices are brought online and integrated with others, the value of data only continues to grow.

The Challenge of Rapid Growth

Depending on the definition of “things” you choose to apply, there are between 6 million and 14 billion connected devices worldwide - not including smartphones, computers and tablets. With annual growth rates ranging between 14 and 29 percent, there will be anywhere from two to six connected “things” for every person living on earth by 2020. At the same time, the number of connected devices will also eclipse the number of smartphones, tablets and computers by a landslide.

When you think about the potential monetization of the data generated by as many as 50 billion connected devices, the total is staggering. For example, many respected industry research firms have estimated the IoT’s impact on the global economy to be in the hundreds of billions in the coming years. And where there’s money to be found, there are also likely those who’d like to help themselves to a piece of that very large pie.

While the benefits of the IoT are undeniable, the reality is that each device that is connected to the network introduces another point of risk to the overall IoT ecosystem. Therefore, it’s essential to secure all IoT devices, since the entire ecosystem is only as strong as its weakest link. Consider the Mirai botnet, which was used to compromise some manufacturers’ IP cameras and launch large-scale DDoS attacks. Today, hackers have built and updated the Mirai code to create derivative malware, so its legacy is still compromising networks today.

Many of the vulnerabilities of IoT devices can be mitigated using recognized security best practices, but unfortunately many products available today fail to incorporate even the most basic security measures.

Guidelines for Securing the IoT

One of the primary challenges to securing the IoT is a lack of comprehensive standards. This is due in large part to the complex ecosystem consisting of a wide range of devices from a large number of manufacturers. It is complicated by the fact that securing the IoT, by definition requires securing standard, scalable, interoperable systems.

With this in mind, when it comes to determining the best way to secure IoT devices, one of the top sources for best practices is the Department of Homeland Security’s Science and Technology (S&T) Directive. Under the directive, the situational awareness of IoT industrial applications and devices must provide three key capabilities:

  • Detect: The ability to know what IoT devices and components are connected to a given network or system.
  • Authenticate: The ability to verify the provenance of IoT components and prevent and detect spoofing
  • Update: IoT security programs must include the ability to securely maintain and upgrade these components

The directive spells out specific requirements and forbids any Internet-connected devices purchased by the U.S. government from utilizing hard-coded or unchangeable usernames and passwords. The guidelines also require vendors to ensure their devices are, at the time of purchase, protected from any known vulnerabilities. Devices must also be able to be patched regularly to protect them from future vulnerabilities.

Additionally, all firmware updates must have an effective authentication mechanism, such as a secure digital signature to prevent unauthorized updates. Finally, devices must use only non-deprecated, industry-standard protocols and technologies for communication, encryption and interconnection with other devices or peripherals.

Meeting DHS Standards

The best way to ensure strong cybersecurity in IoT devices is to ensure that security is built into the device from the start. That means working with manufacturers who recognize the risks and have taken steps to protect their products.

One example is to look for products that incorporate strong device hardening features, meaning they offer appropriate security features and can be hardened and updated through firmware, and that policies are in place to mitigate risk from vulnerabilities. Many manufacturers provide a hardening guide to help security professionals and end users navigate the various security features and determine which are appropriate for a particular application.

Some manufacturers protect devices through the distribution channel using a secure boot feature, which halts the boot process if any foreign code is introduced to the device. Another key feature is signed firmware, meaning that when firmware is downloaded from the manufacturer, it is digitally signed. In the unlikely event that someone can reverse engineer or tamper with firmware, digital signatures prevent it from being loaded on the device.

Finally, it is important to choose products from manufacturers that stay on top of known vulnerabilities and provide patches and updates to address those risks.

Our nation cannot afford a generation of IoT devices deployed with little consideration for security. The consequences are too high given the potential for harm to our critical infrastructure, our personal privacy, and our economy.

The IoT will only continue to grow, and mitigating risk to the entire ecosystem requires deploying devices only after careful consideration of the potential risks. Given the potential outcomes from cyber breaches, the consequences of a breach are simply too high. Therefore, the best advice for securing the IoT may be that any “thing” that cannot be managed under the DHS key capabilities should not be connected to the Internet.

KEYWORDS: cybersecurity data security integrated security solutions Internet of Things (IoT)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rob muehlbauer 21

Robert Muehlbauer is Senior Manager, Business Development Partner Ecosystems, at Axis Communications, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smartphone2-900px.jpg

    Consumers Want “Internet of Things” to Become the “Internet of Intelligence”

    See More
  • cyber

    Enterprise Internet of Things (IoT) cybersecurity

    See More
  • Security newswire default

    Senators Introduce Internet of Things Cybersecurity Improvement Act of 2017

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!