Why IoT security needs more focus on the backend

Why IoT security needs more focus on the backend

There’s no shortage of warnings about the dangers that lacklustre security can have with regards to the Internet of Things. We here have been writing about IoT ‘time bombs’ and ‘wake up calls’ for a while now. And last year the world saw its first IoT security bomb go off in the form of the Mirai botnet.

And while there’s no shortage of research into connected device security and people tearing apart devices, there’s a whole aspect of IoT security that’s being forgotten about.

“A lot of the research focuses on the endpoint devices because that's the legal way to research; you can buy one, you can take it apart without permission or being requested to do so,” says Rik Ferguson, VP of Security Research at Trend Micro.

We consult a panel of IoT security experts to provide some insight on what businesses need to know. Check out: The IoT “time bomb” report: 49 security experts share their views

“You can't go and scan someone's backend and find out what the vulnerabilities are at the data centre side of things.”

To continue reading...


«Typical 24: David Manning, MIGSOLV


C-suite career advice: David Kaganovsky, Maxus»
Dan Swinhoe

Dan is Senior Staff Writer at IDG Connect. Writes about all manner of tech from driverless cars, AI, and Green IT to Cloudy stuff, security, and IoT. Dislikes autoplay ads/videos and garbage written about 'milliennials'.  

  • twt
  • twt
  • Mail

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?