Why IoT security needs more focus on the backend

There’s no shortage of warnings about the dangers that lacklustre security can have with regards to the Internet of Things. We here have been writing about IoT ‘time bombs’ and ‘wake up calls’ for a while now. And last year the world saw its first IoT security bomb go off in the form of the Mirai botnet.

And while there’s no shortage of research into connected device security and people tearing apart devices, there’s a whole aspect of IoT security that’s being forgotten about.

“A lot of the research focuses on the endpoint devices because that's the legal way to research; you can buy one, you can take it apart without permission or being requested to do so,” says Rik Ferguson, VP of Security Research at Trend Micro.

We consult a panel of IoT security experts to provide some insight on what businesses need to know. Check out: The IoT “time bomb” report: 49 security experts share their views

“You can't go and scan someone's backend and find out what the vulnerabilities are at the data centre side of things.”

To continue reading...


« C-suite career advice: David Kaganovsky, Maxus


Typical 24: David Manning, MIGSOLV »
Dan Swinhoe

Dan is a journalist at CSO Online. Previously he was Senior Staff Writer at IDG Connect.

  • twt
  • twt
  • twt
  • Mail


Do you think your smartphone is making you a workaholic?