Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Examining software security implications for IoT device manufacturers

By Tim Mackey
NCSAm
October 27, 2020

Over the past decade we’ve seen an increase in consumer grade IoT devices, but the security of those devices hasn’t always kept pace with the realities of the cyber threats targeting what is arguably an unmanaged computing device. These cyber threats are made more concerning when the expected lifespan of the device is factored in. After all, dishwashers, thermostats and doorbells aren’t devices like smartphones where there is social pressure to have the latest version.

This means that IoT device manufacturers need to invest in cybersecurity not only during design and for the initial software release, but also over the expected lifespan and potentially into obsolescence. For manufacturers new to the connected device world, it’s highly likely that their business plan for a new model includes a maintenance and service model that relies heavily on third parties to manufacture replacement parts and then install them.

When it comes to protecting against cybersecurity threats, this paradigm may not hold up if software patches are required. Effectively, addressing software defects requires cybersecurity skills, an understanding of the framework used to create the software, and an understanding of how the original software functions. Gaps in any of those areas could lead to patches that break other aspects of the software.

And unlike hardware which can be produced by any number of manufacturing facilities, software updates need to be based off the original source code and tested on the platform.

One reality of software development is that software engineers aren’t familiar with every line of code in a given application, and even the sections of code they are familiar with can be forgotten over time. Considering the average dishwasher’s lifespan can exceed ten years, that’s far longer than most engineers’ recollection of why they made the decisions they did when originally writing the code.

Of course, the direct damage of a hacked dishwasher might seem low, but when you consider that the software might have a diagnostic mode allowing water to flow while the door is open, if that can be triggered through a remote attack then the risk of water damage to the home increases.

Even without such a risk, a connected dishwasher is by definition connected to a network. That network has several other devices on it, each with varying levels of software patches and functions. The compromise of a connected dishwasher could provide attackers access to other devices that contain sensitive data.

It is ultimately the data and associated privacy side of the security coin that is most significant for manufacturers as they equip their products with WiFi capabilities. Decisions around what is acceptable data to collect, how that data is processed, where its processed, and who retains it are the subject of many global digital privacy laws. Navigating them is challenging at the best of times, but unlike hardware where once the hardware is designed, it rarely changes, digital privacy regulations are ever-shifting.

Consider that in 2020 the California Consumer Privacy Act came into effect and less than a month later the EU-US Privacy Shield was invalidated by the Court of Justice of the European Union. This ruling directly impacts the legal framework covering how data collected in the EU and sent to the US for processing or storage works. Importantly, when something like the EU-US Privacy Shield is invalidated, there often isn’t a grandfather clause allowing for ongoing operations to continue. This means that manufacturers need to plan for how they’ll address future regulatory hurdles throughout the lifecycle of their products.

For manufacturers creating their first connected products, the complexities of both cybersecurity and digital privacy can be daunting. Your first designs will likely form the template for future products, and they need to have a solid footing. Even if you’ve developed software in the past, adding WiFi or another networking capability opens up the attack surface and will force your development teams to learn new skills. This is precisely the point where external cybersecurity expertise will give the greatest impact, and also where internal collaboration between product, support and legal teams will pay dividends should a cyber incident occur.

Complicating matters further, the data collection rules associated with the product may run afoul of a future privacy law meaning that business decisions surrounding data management that were made during initial revisions of software may increase future business risk. Addressing these security and privacy issues requires device vendors to look at the cost of sale for a device not as a line item on a balance sheet, but instead as a function of overall goodwill to the business. In effect, product security practices and customer friendly secure data processes implemented when a business or product line is in its infancy can help reduce the overall business risk for successful products.  

KEYWORDS: cyber security device management Internet of Things (IoT)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tim Mackey is principal security strategist within the Synopsys Cybersecurity Research Centre (CyRC).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Cyber tech background

Security’s Top Cybersecurity Leaders 2026

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Internet of Things

    NIST Releases Second Draft of Recommendations for IoT Device Manufacturers

    See More
  • iot-enews

    Could a Device Labeling System Under the Trump Administration Lead to Better IoT Security?

    See More
  • meeting1-900px.jpg

    Study Says Manufacturers Struggle with IoT and Finding Skilled Cybersecurity Staff

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage. Learn how foreign adversaries, terrorists and hackers have set their sights on destroying, disrupting, or holding at risk the energy on which national security depend. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing