Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Innovation

    eWEEKChat April 8: Can We Secure the Internet of Other People’s Things?

    By
    Chris Preimesberger
    -
    April 6, 2015
    Share
    Facebook
    Twitter
    Linkedin

      On Wednesday, April 8, at 11 a.m. PST/2 p.m. EST/7 p.m. GMT, @eWEEKNews will host its monthly #eWEEKChat. The topic will be “Can We Secure the Internet of Other People’s Things?” It will be moderated by Chris Preimesberger, who serves as eWEEK’s editor of features and analysis.

      Some quick facts:

      Topic: Can We Secure the Internet of Other People’s Things?

      Date/time: April 8, 2014 @11a.m. PST/2 p.m. EST/7 p.m. GMT

      Hosted by: @eWEEKNews

      Sponsored by: Hewlett-Packard

      Moderator: Chris Preimesberger: @editingwhiz

      Tweetchat handle: Use #eWEEKChat to follow/participate or use the widget below.

      Chatroom real-time links: We have two: http://tweetchat.com/room/eweekchat or http://www.tchat.io/rooms/eweekchat.

      Can We Secure the Internet of Other People’s Things?

      The Internet of Other People’s Things is another way to describe the IoT in the hands of bad actors. The person-to-person Internet has long been a playground for hackers, but the IoT, with all the autonomic devices about to come online, multiplies attack surfaces tremendously.

      However, the IoOPT isn’t only about bad actors. People, and not always bad guys, will be connecting (often by accident) with other people’s devices more often, and not just with phones and tablets. The sheer number of new URLs will fan this flame. Network flaws and crossed wires in networks also will contribute to this. Security will work well for some devices and networks and less well on other networks.

      IoT devices will mostly be embedded systems with lightweight operating systems, such as Linux. Each device will thus be a fully accessible server on the Internet with access to the rest of the Internet. There are already too many possible points of entry for security to be airtight, and with the IoT, these will be multiplied a hundredfold or more.

      Talk about the Wild West. There are no IoT-related regulations involved at this early point–security or otherwise. Any entity can have as many IP addresses as they desire for use in any way they want. Scale-out IoT isn’t an issue; there appear to be no limits on the size and scope of networks, as long as there is bandwidth to run everything. With more entries into the Internet comes more on-ramps for hackers.

      More Entry Points, More Hacking Doorways

      How will we stop a malicious third party who takes control of 1 million or 10 million inanimate devices? What will happen if that malicious third party decided to launch attacks using all those devices? This is happening now, and it will only be happening more often, and with more zombie devices.

      Where is all this new data going to live? The answer is the usual places: storage arrays, networks and servers on-premises and in the cloud that are hit all the time by hackers. But conventional protection of storage silos and servers has not succeeded. We need to get more granular with data security.

      New security schemes are now being built for this possibility, but it may take years for them to replace entrenched legacy enterprise security systems. Individuals can move faster on this. Until we start maintaining each of our own corners of the Internet with more care, our own devices will eventually become part of the Internet of Other People’s Things and in the control of bad actors. In fact, many of our devices are already part of that “bad actor” setup, and we don’t know it.

      Thus, the security and privacy of individual data files, using encryption and federated or two-step authentication whenever possible, is where this is all leading. Next-gen security will need to start with a data-centric–not a system-centric–approach.

      What is this, and how does it work? Join our discussion April 8 to find out.

      Questions we likely will ask on April 8:

      Q1: How do you define data-centric anything: networking, storage, security?

      Q2: Are any of you currently using a data-centric security-type system?

      Q3: Who are some vendors you know that are working on new-gen security for the Internet?

      Q4: What types of security would you like to see at your company, or in your own network? You can dream here.

      Q5: Do you think it’s possible for hacking to be completely blunted? Will the bad actors always be ahead of the institutions?

      Plan to join us for an hour on April 8.

      DIGITAL EVENTS

      How Breach & Attack Simulation Can Improve Your Security Strategy

      6 Steps to Effective Incident Response

      The State of Enterprise Encryption and How to Improve It

      How Tri-Counties Regional Center Secures Sensitive Files and Maintains HIPAA ComplianceNew article

      Extend Your Operational Analytics Beyond IT and Improve Your Business Outcomes

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more

      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×