Subscribe to our Newsletter | To Post On IoT Central, Click here


All Posts (907)

To outsource or not to outsource?

 

Depending on who you are talking to, the idea of outsourcing can promote some very positive or negative reactions. ‘Off-shoring’ and ‘unfair competition’ are thrown against ‘specialization’ and        ‘lower costs’. Whether you are considering product development, the provision of specialist services or the handling of back office activities, there are a number of pros and cons that need to be considered.

What is outsourcing?

Outsourcing is defined as ‘the process of paying to have part of a company's work done by another company’. It can therefore cover a wide range of business activities and is usually undertaken as a cost-cutting or efficiency optimization measure. Investopedia states that was first recognized as a business strategy in 1989 and became an integral part of business economics throughout the 1990s and makes the point that ‘the practice of outsourcing is subject to considerable controversy in many countries. Those opposed argue it has caused the loss of domestic jobs, particularly in the manufacturing sector. Supporters say it creates an incentive for businesses and companies to allocate resources where they are most effective, and that outsourcing helps maintain the nature of free market economies on a global scale’.

Typically then, a firm will have a project or an ongoing activity that it wishes or needs to undertake but which, for example, it does not have the necessary in-house skills to undertake, does not form part of its core activities, or which it does not have the resources to fully undertake. The firm will search for another company that specializes in the area and seek to outsource the particular activities to them. The IT sector is one of the main areas – along with Human Resource and finance – that thrives on outsourcing.

Benefits of outsourcing

There are a number of advantages of outsourcing:

  1. Greater access to expertise. By working with firms who are specialists in a particular area, a company can gain greater access to the relevant skills and knowledge in a quicker timeframe. This can include access to cutting-edge tools and concepts and insight into the developments within the sector that would otherwise not be available. Using an outsourced firm can also give access to a wider pool of expertise and talent, as the contractor will have access to these within its own sector – access that the contracting firm would not be able to gain.
  2. Greater efficiency. One of the key tenants of economic efficiency, going back to Adam Smith and the Wealth of Nations in the 1770s, is that specialization can increase efficiency and that greater efficiency can increase economic returns – that is, at a company level, by specializing on its core activities, a company is better able to gain a competitive advantage and increase financial returns. By thus avoiding diverting resources into non-core activities and relying on specialized outsource companies to provide these non-core activities (which are core for the contractor company), greater productivity can be generated.
  3. Reduced costs. One of the primary benefits of outsourcing to hire a dedicated team is that the contracting firm does not need to employ more people to undertake temporary or non-core activities. Given that staff costs make up a large component of ongoing expense for a company, this can substantially reduce costs. As a factor, this should not be underestimated: in the EU, for example, firms need to add an extra 24% in non-wage costs (from 6% in Malta to 33% in France).
  4. Developing partnerships. Outsourcing can help a company develop relationship with partner companies, whether domestically or abroad. This in turn can generate further business opportunities.

The downsides to outsourcing

There are, however, some disadvantages to outsourcing:

  1. Lack of direct control. While the relationship between the outsourcing firm and the contractor will be determined by a contract or by a service level agreement, there is a level of reduced control that comes from outsourcing.
  2. Changes in requirements. Business requirements change, this is a fact of life. But if you need to change the contracting agreement between a company and the contractor, this can be difficult to do if – for example – you are in the middle of a several year-long agreement, or it can result in increased costs for the change in service to be accepted.
  3. Increased communication issues. Contracting out some of your activities or product development can result in increased communication problems, with staff in both companies having to understand two different companies’ ways of communicating. This can lead to misunderstandings and, in some cases, cause serious problems if there is not the goodwill to resolve issues.
  4. While product development, for instance, with a specialist contractor can result in a world class product, by definition in an outsourcing relationship you are in the hands of the contractor, to a degree. This means that if the quality of the product is not that which you wanted or which you had agreed with a stakeholder, you will often not be able to solve it yourself and will need to work with the contractor to do so – and that will often involve addition costs.

Summary

The decision on whether to outsource, for example for product development or to hire a dedicated development team is one that each company needs to assess for itself. There are considerable advantages in terms of gaining access to expertise and skills and keeping costs controlled. But at the same time there are potential risks of which a company needs to be aware. With effective management and good communication, these risks can be substantially reduced – but both sides in the relationship need to be aware of the need for this and take steps to ensure that the outsourcing runs effectively.  

 

Read more…

3561221589?profile=RESIZE_710x

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The term Digital Transformation means different things for different people. Some people might think of it as switching from manual processes to autonomous processes, while for others it might be about the insights that the data brings, which can help in making business decisions. What can Digital Transformation or moving towards Industry 4.0 do for the manufacturing sector? It can lead to enhanced production cycles, increased customization, a focus on reinforced products and better access to information for employees.

Read more…

Blockchain and IoT: are they a perfect match?

As IoT becomes more prevalent, more CIOs are asked to take the reins of IoT projects. Gartner recently found that just under a third of responding organizations expected their CIO would lead their IoT efforts, and that by 2020, more than 10% of IoT projects in traditional industries would be headed by the CIO.

This prompted Jenny Beresford, research director, to caution: ‘The IoT will expand rapidly and extensively, continually surfacing novel and unforeseen opportunities and threats.’

Among those threats — which will definitely be CIOs’ responsibility — is the woeful security of traditional IoT and IIoT networks, as well as the privacy, connectivity and transaction speed issues that frequently plague IoT implementation.

To be maximally effective such a network must somehow be both highly connected and highly secure, and currently only one technology — blockchain — can achieve this.

However, obstacles remain, including the lack of an IoT-friendly blockchain consensus protocol.

Network Security and Data Exchange

IoT and IIoT networks typically lack physical security, host-based defences, and software updates and patches. These networks typically also use less-secure wifi protocols, web apps and APIs, combining larger-than-usual attack surface with weaker-than-usual security while retaining single points of control and failure.

In IoT, hackers see a new prize: gigantic botnets which can be used to spread malware, as with the Mirai botnet. And in IIoT, the rewards of network penetration can be industrial sabotage, espionage or large-scale blackmail, like Florida’s Riviera Beach.

Yet, companies cannot afford to hold off indefinitely on deploying IoT technology, since doing so exposes the organization to risk of being outmanoeuvred by competitors. Blockchain offers CIOs a way to deliver their IoT projects with the inherent security issues of large, distributed networks essentially solved.

Blockchain for IoT inherently eliminates single points of control and failure while simultaneously offering modular encryption and auditable transaction logs, so security issues are isolated, easy to identify and cannot spread through the network. Even if they do, they can’t gain control of it.

Transaction Processing

Machine-to-machine (M2M) communications generate gigantic amounts of data in transit — and the number of connected devices is growing rapidly:

3636380048?profile=RESIZE_710x

With centralized control, much of the processing power of these devices is lost to idling, while trust issues keep transaction costs high. CIOs find themselves in the position of paying for computational capacity they can’t use, and for traditional data centers that represent a ‘honeypot’ for attackers and a bottleneck for their networks.

Peer-to-peer communication across connected devices would enable dynamic transaction load balancing, enabling spare computing power to be identified and employed and potentially eliminating centralized data storage.

To do this successfully, IoT will need to become trustless as well as peer-to-peer. Blockchain offers a trustless peer-to-peer communication and transaction medium with secure, unforgeable and auditable transaction logs; smart contracts can be used to set policies, control and monitor access rights and execute actions autonomously based on pre-defined conditions.

Privacy and Autonomy

IoT systems built on traditional networks cannot prevent access by governments, service providers or criminal actors. With weak security and single points of control, trust on these networks is impossible to guarantee.

IoT and IIoT both require connectivity and modular security. The current solution, ‘security through obscurity,’ must be replaced by a systemic shift to open-source systems that achieve ‘security through transparency’ and are far less vulnerable to sophisticated, persistent institutional attacks.

Without this shift, both consumer and industrial networks will be increasingly vulnerable, and as the number of connected devices grows, radically lower-cost privacy and autonomy will be necessary to save the IoT.

IoT Connectivity Costs

In the current iteration of the IoT, costs are prohibitively high while revenues fail to meet expectations. Many existing IoT solutions are expensive because of the high infrastructure and maintenance costs associated with centralized cloud delivery and large server farms.

IoT devices violate the traditional pricing and revenue model of the IT industry too: device costs and incomes don’t line up, and maintenance costs consume substantial amounts of revenue. Inherent technical reasons make this unavoidable using the current model, but CEOs still don’t like hearing it from their CIOs.

Cost reduction

Blockchain technology allows reliable data to be pooled and shared without trust, directly among stakeholders. This allows for a significant cost reduction, eliminating intermediaries and allowing for automatic transactions and payments across devices using smart contracts.

Blockchain-IoT Integration Challenges: Lack of an IoT-centric consensus protocol

The current consensus protocols available for blockchains — PoW, PoS, PoET, and IOTA — are all designed for permissionless blockchains focusing on financial value transfer. PoS and PoET can also be used in permissioned blockchains, but their consensus is probabilistic and does not end in a permanently-committed block, resulting in an unacceptably high ‘hard fork’ rate.

PoET requires specialist hardware and the enclave allocating wait time is a trusted entity; it has also proven vulnerable to node compromise.

What’s needed is a consensus that can keep the benefits of the distributed, auditable, trustless environment blockchain provides, but deliver it in real time and at scale — without mining or excessing transaction costs, and without multiple hard forks.

Read more…
Embedded systems are maybe the most complex part of an integrated IoT solution. Looking at my company's experience I can say that most programmers that come to build IoT systems have to have additional experience if they want to work with hardware. Customers that want to hire IoT developers also need to have a basic understanding of what skills his future contractors must have.
Read more…

Having a smart home is all well and good until you become a victim of data leakage. 

This is not a discouragement against IoT implementation into your home, however. The Internet of Things market has been on the rise, and thanks to that, even our homes have become smarter. We don’t have to worry about doing our laundry, or making coffee manually anymore. With just a command we can do these things without having to move away from that comfy couch. 

Parks-Associates--Consumer-Trust-Smart-Home-Product-Purchase-Channels-645px.gif

But over the last couple of years, some incidents have shown that the matter of smart homes might not be all it’s hyped up to be. Just like everything, IoT implementation in smart homes has a bright and a dark side, but it seems the dark side is more sinister than the bright one. 

Incident one:

The combined research conducted by Northeastern University and Imperial College of London has shown how consumer devices are not to be trusted when dealing with client data. The researchers conducted 34,586 controlled experiments on 81 different IoT devices, 46 of which are from the US and 35 are from the UK, and this is what they found out-

  • 72 out of these 81 devices are connecting to services that are not the first party. Which means they are connecting domains and addresses that have no business connecting to the device. 
  • The research showed that 56% of the US devices and 83.8% of the UK devices were connecting to domains that were not in their region. 
  • The safety of the data on an online connection depends on the level of encryption, but here’s the kicker- according to the research, all the tested devices have at least one plain-text flow, which means at least one data flow from all the devices is non-encrypted. Not to mention, any cyber-evesdroppers can analyze device traffic, encrypted or not, and figure out the user and device behavior. 

But in any case, this is just research. What happens when a smart home management platform leaves a server with important user data exposed on the internet without any password or protection?

Incident Two:

Around mid-June, the security team at vpnMentor, lead by security researchers Noam Rotem and Ran Locar, spotted a completely exposed server containing the customer details of 2 million users, including their usernames, passwords, and password reset codes. 

The server in question belongs to a Chinese smart home management platform Orvibo. Their smart home management Smartmate helps users control every aspect of their smart home, from security to closing the curtains. 

Not only a smart-home management system, but Orvibo also deals in self-manufactured smart home products such as smart light bulbs, HVAC systems, home entertainment systems, security cameras, smart power plugs, and many more. 

The open server containing user information poses a huge threat to everyone who’s data has been exposed. Since the data breach being exposed, Orvibo has taken steps to secure the server. Even then, the data breach can have serious repercussions for the users. What are these repercussions though? Let’s find out what can happen to your data if it is leaked by your smart home device. 

What will happen if your data is breached?

When hearing about IoT and data breach, the user can have two kinds of reactions.

One group would panic, and probably stop using all kinds of smart devices. 

Another group would ask so what if their data is being breached? And this point is to answer the question for the latter group. 

There is a reason why smart home security is something to be concerned about. The personal and sensitive data, the users enter in order to run the devices, can be manipulated in various ways, and each one would only harm the users. 

So what are the ways hackers can manipulate the IoT devices and data that make your home smart?

1. Manipulating The Devices

The first thing you might do after getting a smart device for your home is to configure its username and password. 

However, this is not a widespread practice. Most people often end up using the same default username and password the device came with, which means that it’s going to be super easy for the hackers to get your data and gain access to your device. And from there on, it’s an open sandbox for them to play with. They can do whatever they want with your device, but there’s one guarantee- whatever they do is not going to do you any good. 

2. Holding Your Data And Device For Ransom

The ransomware attack is the most familiar in the IoT industry. Through this, what the hacker usually does is that they would gain access to an IoT device, and cut off the legitimate user’s access. Then they would ask for a ransom for restoring the user’s access to that device. 

While this may not seem to be as dangerous, it is a serious threat. Once the hackers have gained access to your data, they can use it for many malicious ends, things you don’t even have any idea about. And not to mention, there is no guarantee that they would give you back the access to your data once you pay them. And that’s why implementing some serious security protocols in place is needed to prevent your device and data from ransomware attacks. 

3. Doing Serious Damage To Your Home

This one might seem a little petty, but here we go anyways. 

Imagine having a smart thermostat, which you can control using online access. Now imagine going out on a vacation with your family, making sure that everything around the house is shut down, even the thermostat. However, when you get back, you see that the thermostat turned up to its highest setting on its own, melting every plastic thing in your house. 

But did it happen on its own? How are you going to find out whether it just happened or someone purposefully hacked into your smart home system and used the thermostat to seriously damage your home? Stealing the authorization details, hackers can do this for multiple reasons, ranging from personal vendetta to trivial entertainment because they were bored. Either way, it is your home that will be damaged. 

4. Actively Robbing Your Home

When details such as passwords and user IDs, along with device IDs are being sent to an unknown third-party domain without any encryption, the data can be used in many ways, and one of them can be to rob your home. 

Think about how a hacker-robber group can hack into the security system of your home, disable it and then walk into your home to steal everything from you. This is a bold use of smart home data breaches, and it can be quite fatal in case someone is home when they decided to hit the house. In this case, the loss of data security can result in serious loss of physical property as well. 

5. Launching A Botnet Attack

Last but not least, gaining access to your IoT smart home devices, the hackers can turn these devices into zombie devices and launch a botnet attack. A botnet is a number of internet-connected devices. Each of these devices is running one or more bots, which can be used to perform distributed denial-of-service attacks. 

Through this, the hackers can also steal important data, send spam emails, getting the attacker access to the device, this is not only going to create a problem for you but others as well. 

With a DDoS attack, the botnets can connect to a website, generating so much traffic that the website crashes, leaving them vulnerable for many data exploitations. Using your IoT device, the hackers can launch a similar botnet attack to that of the Mirai Botnet attack of 2016. The Mirai botnet attack brought down a french host OVH. and that’s how your smart home devices can be turned into a weapon to bring down popular websites around the world. 

What Is Going To Be The Solutions?

Every problem has a solution, and so does this one. 

There have been plenty of solutions suggested for the data security of IoT devices. But so far only two of these solutions stand out. One is the use of machine learning, another being Blockchain. 

The Machine Learning Solution For Smart Homes

Rather than looking for a security solution for each device, AI and machine learning can create a shield of security for all the IoT devices for your home network. Deep learning and machine learning can not only monitor each and every device connected to the network, but they can also detect and prevent any unwanted and unknown device trying to connect with the home network. 

The use of AI comes in handy when analyzing the network traffic. This way the AI can keep up with the general traffic flow of each of the devices and detect any anomalies in the normal flow of traffic. Which means fewer chances of any hackers getting inside your home network. You can check out these top 10 highly performing smart home apps making it big.

Along with these benefits, the use of Machine learning and deep learning can also detect botnet activity, manage device authentication and access management. This way they can manage to give your smart home network 360-degree security without worrying you. 

The Blockchain Solution To All Things Smart-homes

The main problem with the smart home network is the centralization of data, which could be easily hacked into. And that’s why Blockchain can provide a decentralized solution to this problem. 

Once the smart home IoT systems start utilizing the blockchain system for data communication, the security will increase tenfold, because it is close to impossible to hack into a blockchain network and change the data. To do so, the hacker would have to have control of 51% of the devices connected, and when the number of connected devices spans millions, it can be a little tough. 

Not to mention, blockchain in IoT will end the trend of data monopolization. Your data won’t be a subject of daily business deals with large conglomerates. Blockchain can bring affordability and security for smart homes that people have been asking for a long time.

Conclusion 

So does it mean you should not be using smart home technology?

The answer is no, absolutely not. It is undeniable that smart home technology has its own benefits and you should be able to take advantage of that. But only after you have made sure of your data security. Once you have made sure that all the devices you are using are secure. You can make use of IoT devices for your home as much as you want. Always remember that the security measures for your home IoT devices are not a matter of joke.

Read more…

The transportation and logistics industry is one of the most vulnerable sectors to cyber attackers. As more connected solutions are introduced to improve efficiency, securing these complex cyber-physical systems will require multi-layer security from Sensor to Cloud.

Read more…
Industrial automation and controls modernization can be a daunting task. Is it time to upgrade? What will this cost me? Are we ready? How will we even do this? There is a lot to consider with all those questions, and probably more, running through your head. A good starting point for developing a plan is to start by organizing the information that needs to be gathered to scope the project(s). From there, you can start talking to integrators and vendors to get pricing, budgets, timelines, and equipment lists. To develop a thorough spec, follow these steps.
Read more…

How IoT Reinvented the Business World

Internet of Things (IoT) has completely transformed the business world and drive it to the next level. The connected smart devices have turned the strategies into increased profitability. 

While seeing the present scenario, the demand for IoT solutions is increasing day by day.  To maintain the remarkable presence and to serve the enterprises with effective results, the IoT Solution provider company is enhancing and upgrading the strategies and solutions day by day. 

The work strategies of businesses have completely transformed and IoT has become a key to success. According to Forbes, “More than seven in 10 executives credit IoT with delivering increased revenue. Currently, 45% report IoT has helped boost profits by 1% to 5%, and another 41% say the impact has boosted them by 5% to 15% annually. Over the coming year, nearly all, 94%, anticipate a profit boost of at least 5% to 15% as a result of IoT.” 

So, in this article, we are going to tell you the advantages of the integration of IoT. 

Benefits of the Internet of Things 

Increased Productivity 

The integration of the Internet of Things has increased the productivity of the employees. As through the integration of smart devices, the speed process of many tasks used to increase and results are error-free. 

Saves Time 

IoT smart solutions save the time of the employees, as it excludes the repetition task of humans like the data entry in management or inventory management system. Resources can utilize that time and energy in other potential work processes. 

Easy Tracking System 

For the shipping industry, tracking has always been a hectic and troublesome process. But IoT has sorted out this challenge, as now with smart wearable devices the ship can be tracked by the management and customers also. 

Tracking System can be held by these following methods: 

1) RFID -  Stands for Radio Frequency Identification, through its team track the ship based on frequencies, there are many challenges but with time and upgraded technologies, it has turned into an easy method. 

2) GPS: The term GPS stands for Global Positioning Satellite system, GPS solutions have been integrated into the smartphones also. It helps to track real-time information. GPS can be integrated into wearable devices and smartphones. 

Increase Remote Working Process 

Working from home employees is less expensive for the enterprises as it saves the cost of infrastructure and with various IoT solutions, the working process from home has become easier. Time to time employees can update their working and have proper communication. 

Improve Customer Experience 

Internet of Things technology improves the customer experience as through it, enterprises can offer a new experience to their customers, by offering a multi-dimensional and 3D view. 

Along with this, it is helpful to provide the best facilities to the customer by monitoring, regulating and maintaining real-time issues. Often passengers face a lot of challenges like broken escalators, dirty washrooms, these issues can be analyzed through smart sensors and immediately the action can be taken by the authorities. 

As per the Forbes Insight Survey, “56%, are investing in IoT to build on the customer experience they’re delivering, and 42% have been able to expand their capabilities in terms of personalized customer experience as a result of IoT.”

Conclusion 

The demand for integration of IoT smart technologies is increasing day by day as it is turning out to be the profitable strategy for the enterprises.  Along with this, it has become an essential technology of the business and considered a smart investment. This takes the business to new level.

Read more…

What is OPC?

The acronym “OPC” stands for “OLE (Object Linking and Embedding) for Process Control”. OLE is based on the Windows COM (Component Object Model) standard.

OPC standard is implemented in server/client pairs. The OPC server is a program that translates the hardware communication protocol used by a PLC into the OPC protocol. The OPC client software is a program that connects to the hardware, such as an HMI. The OPC client communicates with the OPC server to receive data or send commands to the hardware.

 

How does OPC work?

OPC specification describes the interface between clients and servers, servers and servers, including access to real-time data, monitoring of alarms and events, access to historical data and other applications.

The classic OPC connection scenario is a single server-client connection on a single computer, but there are more options which include:

  • Connecting an OPC client to several OPC servers. This is called OPC aggregation.
  • Connecting an OPC client to an OPC server over a network. This can be done with OPC tunneling
  • Connecting an OPC server to another OPC server to share data. This is known as OPC bridging

 

Technical Benefits of OPC

In addition to improving OPC server and client connections, the OPC DataHub can connect any OPC server or client to other applications as well, including Excel, a web browser, or any other database. And, it can be used to import OPC data into Linux or QNX.
Usage

Following OPC specifications are used in industries:

  • OPC-DA (Data Access): Provides access to real-time data. We can query most recent

values of temperature, pressure, density, acceleration, and other types of process control data from OPC-DA server.

  • OPC-HDA (Historical Data Access): This is used to retrieve historical process data for analysis. This data is typically stored in files, databases or remote telemetry systems.
  • OPC-AE (Alarms & Events): OPC AE servers are used to accept and exchange

process alarms and events.

  • OPC-DX (Data eXchange): It defines the way OPC server data is exchanged with other OPC servers.
  • OPC-XML (XML Data Access): It defines schema and data representation formats based upon XML standard. This makes it possible to share & manipulate process control data across all operating systems – Windows, UNIX, Solaris, etc.


Benefits of using OPC standard are:

  • Reduced load on the hardware device.
  • Increased scalability of the system.
  • Because of OPC server, client applications need not know anything about hardware protocol details.
  • Though device need not serve multiple clients, So Increased life for the device.
  • Interoperability (Unix/Linux and Windows – both platforms are supported by OPC)
  • Standardization

eInfochips – OPC implementation

At eInfochips, we have provided embedded solutions for OPC’s industrial automation product line for our clients in embedded solutions. This includes detailed work on:

  • BIS systems: Building Integration System , or BIS, is a software package that brings building automation, access control, video surveillance, intrusion, fire alarms and voice evacuation onto one convenient management suite. The classic OPC Server had implemented specific protocol over TCP/IP protocol to monitor and control different types of building integration system panels, which is able to interface with OPC client of the BIS system software.
  • System alerts: In OPC Server, we had implemented OPC-DA (Data Access), OPC-HDA (Historical Data Access) and OPC-AE (Alarms & Events) specifications. For controlling and monitoring panels, OPC client fires different commands to the panels by using OPC server e.g. unlock door, lock door, arm area etc.

OPC server developed by eInfochips contains the following modules, functionalities and activities, listed below.

To know more about the IoT services and solutions

  • Design, Development and Testing of OPC Classic server for different panels used in a building integration system with specific Automation protocol
  • Implementation of following group commands on OPC Server,
    • System
    • Panel
    • Door
    • Area
    • Output
    • Point
  • OPC server communication stacks integration (TCP)
  • OPC server security – Command Authentication AES 256
  • Client and status command implementation

We have also developed OPC Clients for our customers, running on Linux OS to communicate with OPC server over Ethernet. This further communicates with OPC server for Reading and Writing data/parameters. In OPC Client, we had implemented OPC-DA (Data Access), OPC-HDA (Historical Data Access) and OPC-AE (Alarms & Events) specifications. OPC Client will communicate with OPC Server for fetching data from the PLC. At the other end, it will send/receive historical and live data of temperature, pressure, density, acceleration etc. from the OPC server to the cloud for storage and analysis.

To know more about how we can help you with OPC implementation for your building automation needs, Learn more about our Industrial Automation Solutions or digital engineering services

 

Read more…

How PKI & Embedded Security Can Help Stop Aircraft Cyberattacks

 by August 27, 2019 by Alan Grau, VP of IoT, Embedded Systems, Sectigo

 

On July 30th, the U.S. Department of Homeland Security Cybersecurity and Infrastructure Agency (CISA) issued a security alert warning small aircraft owners about vulnerabilities that can be exploited to alter airplane telemetry. At risk to cyberattack, the aircraft’s Controller Area Network (CAN bus) connects the various avionics systems–control, navigation, sensing, monitoring, communication, and entertainment systems–that enable modern-day aircraft to safely operate. This includes the aircraft’s engine telemetry readings, compass and attitude data, airspeeds, and angle of attack; all of which could be hacked to provide false readings to pilots and automated computer systems that help fly the plane.

The CISA warning isn’t hypothetical, and the consequences of inaction could prove deadly. Airplane systems have already been compromised. In September 2016, a U.S. government official revealed that he and his team of IT experts had successfully remotely hacked into a Boeing 757 passenger plane as it sat on a New Jersey runway, and were able to take control of its flight functions. The year before, a hacker reportedly used vulnerabilities with the IFE (In Flight Entertainment) system to reportedly take control of flight functions, causing the airplane engines to climb.

InFlightLIStockImage.png
The Boeing 757 attack was performed using the In-Flight Entertainment Wi-Fi network.
 

A researcher with security analytics and automation provider Rapid7 wrote about the security of CAN Bus avionics systems in a recent blog and discussed the challenge at this year’s DEFCON security conference. He explained, "I think part of the reason [the avionics sector is lagging in network security when it comes to CAN bus] is its heavy reliance on the physical security of airplanes . . . Just as football helmets may actually raise the risk of brain injuries, the increased perceived physical security of aircraft may be paradoxically making them more vulnerable to cyberattack, not less."

A False Sense of [Physical Access] Security

The DHS CISA warning stated, "An attacker with physical access to the aircraft could attach a device to an avionics CAN bus that could be used to inject false data, resulting in incorrect readings in avionic equipment.” CISA fears that, if exploited, these vulnerabilities could provide false readings to pilots, and lead to crashes or other air incidents involving small aircraft. Attackers with CAN bus access could alter engine telemetry readings, compass and attitude data, altitude, and airspeeds. Serious stuff.

Not all of these attacks required physical access.

These risks should serve as a wake-up call to everyone in manufacturing. Any device, system, or organization that controls operation of a system is at risk, and the threats can originate from internal or external sources. It’s critical for OEMs, their supply chains, and enterprises to include security and identity management at the device level and continually fortify their security capabilities to close vulnerabilities.

Security Solutions for Avionics Devices

Today’s airplanes have dozens of connected subsystems transmitting critical telemetry and control data to each other. Currently, tier-one suppliers and OEMs in aviation have failed to broadly implement security technologies such as secure boot, secure communication and embedded firewalls on their devices, leaving them vulnerable to hacking. While OEMs have begun to address these issues, there is much more to be done.

Sectigo offers solutions so that OEMs, their supply chains, and enterprises can take full advantage of PKI and embedded security technology for connected devices. Our industry-first end-to-end IoT Platform, made possible through the acquisition of Icon Labs, a provider of security solutions for embedded OEMs and IoT device manufacturers, can be used to issue and renew certificates using a single trust model that’s interoperable with any issuance model and across all supported devices, operating systems (OS), protocols, and chipsets.

Much like the automotive industry, the aviation sector has a very complex supply chain, and implementing private PKI and embedded security introduces interoperability challenges. With leading avionics manufacturers introducing hundreds of SKUs per year, maintaining hundreds of different secure boots within a single aircraft is complex, cumbersome, and ultimately untenable. Using a single homogenous secure boot implementation greatly simplifies the model.

Purpose-built PKI for IoT, such as the Sectigo IoT Manager, enables strong authentication and secure communication between devices within the airframe. Using PKI-based authentication prevents communication from unauthorized components or devices and will eliminate a broad set of attacks.

Embedded firewall technology provides an additional, critical security layer for these systems. This is particularly relevant for attacks such as the Boeing 757 attack via the airline Infotainment Wi-Fi Network. An embedded firewall provides support for filtering rules to prevent access from the Wi-Fi network to the control network.

Icon Labs embedded firewall has been has deployed in airline and automotive systems to address attacks such as these. In both instances, our embedded firewall sits on a gateway device in the vehicle or airplane to prevent unauthorized access from external networks or devices into the control network, or from the Infotainment network to the control network. We continue to see interest in this area, indicating manufacturers are beginning to act.

From Cockpits to Control Towers

Securing connected devices in aviation is not limited to airplanes. The industry requires secure communication between everything on the tarmac, from cockpits and control towers to provisioning vehicles and safety personnel. For that reason, Sectigo provides an award-winning co-root of the AeroMACS consortium, which addresses all broadband communication at airports across the world and calls for security using PKI certificates to be deployed into airplanes, catering trucks, and everything else on the tarmac.

Future Proofing with Crypto Agility

It’s worth noting that aviation is also uniquely challenged by the tenure of its components. Unlike devices that are designed to last for months or years, airplanes are designed to last for decades. Advances in quantum computing, which many experts believe is just around the corner, threaten to make today’s cryptographic standards obsolete. Aeronautical suppliers need to be prepared for this coming “crypto-apocalypse” and to update the security on their devices in the field while the devices are in operation. Sectigo’s over-the-air update abilities provide the cryptographic agility to guard against this upcoming crypto-apocalypse (listen to the related Root Causes podcast).

The ecosystem has fast work to do. Manufacturers must secure the CAN buses in their existing, and future fleets – whether those planes idle on fenced tarmacs, or in airplane hangars. In the meantime, CISA counsels that aircraft owners restrict access to planes avionics' components "to the best of their abilities,” leaving passengers to hope security soon extends beyond their TSA experiences.

Read this blog online at https://sectigo.com/blog/how-pki-and-embedded-security-can-help-stop-aircraft-cyberattacks

Read more…

The Impact of AI on Taxi Dispatch Systems

Taxis have long been a part of the daily transportation system all over the globe. Also, they are so crucial that it is hard to imagine life without them even if your city offers a proficient and well-connected network of public transportation. Moreover, as the cost of private vehicle ownership continues to grow at a mind-boggling pace, it is easy to see why people are turning to taxis for completing their commutes to work or anywhere else they may need to go. However, is that all there is to the sudden increase in demand for taxis? Actually, no.

Today, customers live in a highly digital world that accommodates all their needs, demands, and requests. This expectation is also extended to taxi failing services. Thankfully, companies that provide such services have been quick to adapt to evolving customer expectations, thus marking yet another crucial reason behind the high demand for taxi dispatch systems. It has also given rise to intense competition as well as the need for robust solutions to establish an edge over rivals. Moreover, in this search for a tool, you will find that one name stands out from the crows: Artificial intelligence. So, without further ado, let’s take a look at how this technological novelty can help your taxi business.

  1. Personalization: There’s not a user on the face of the earth who doesn’t like personalized service. It holds for customers of taxi businesses as well. To that end, AI helps by providing access to users’ locations and their activity on your taxi app along with data about other apps, platforms, and the services they use frequently. This data is crucial for understanding a user’s preferences, which can then be used to push more relevant content and offers to them.
  2. Better decision making: Data is a truly versatile gift that technology has given us. Data gathered by the company can be processed to glean insights and identify trends, among other things. Such information can then inform strategic decisions executives have to make for the business. AI empowers businesses with comprehensive analytics about vital factors like customer behavior, service demand, and more. that can go a long way in making smarter decisions for the business’ future.
  3. Predict demand: Besides driving better and more intelligent business decisions, AI can also be used for predictive analytics to predict demand and that too with a high degree of precision. AI helps gather data, including historical data, and then utilizes predictive analytics to deliver appropriate predictions about the kind of demand your taxi business should expect and when it can wait to start showing.

The world already has and continues to benefit from the potential of artificial intelligence. Just take a look at e-commerce — giants like Amazon, Flipkart, and more have integrated AI so profoundly within their platforms and are reaping the benefits of that decision too. So that’s just one industry. Suffice it to say that taxi app development mixed with AI stands to offer so much to a taxi business: Better customer service, enhanced customer experiences, massive business growth, and more. We could go on and on, but you get the drift, don’t you?

Read more…

More often than not, the budget and cost of ownership with a build-versus-buy aspect has been a key consideration in the decision-making process. Once after that, one goes out to seek the flexibility of the platform, vendor lock-ins, and scalability, which are definitely equally important, if not more.

The field, Internet of Things IoT, is one such domain which is driven by volume, velocity and variety. This makes you picky about the choices you make. Technologies continue to emerge and enable a myriad of IoT use cases. 

If you are thinking about selecting a platform partner for your IoT based project, there are a few criteria you need to consider before solid decision-making. 

Regulation of IoT devices

Today, in the present time, there are more devices connected to the internet than humans. This clearly shows the upward trend. Data says that, more than 75 billion internet based devices will be connected by the end of 2025. IoT has been adopted within multiple applications and is being used across industries or IIoT, enterprises--smart cities and waste management, healthcare, etc.

The overall adoption of IoT is providing companies the much-required agility, efficiency, and scalability. All combined together are providing a competitive advantage to businesses. Things are going North for IoT and vendors who provide a versatile IoT platform to help these companies get on the IoT bandwagon.

Taking the build vs buy decision

There are chances that things might get a little overwhelming if you fail to define your expected outcomes before choosing the right platform partner. Some of the pointers you should jot down are: What kind of data are you processing, which systems need to be integrated, and what kind of insights do you wish to generate? 

Asking the right questions can help you arrive at the right place, which is: whether to build or to buy? Think on critically evaluating various components separately, including device type, communication, cloud services, applications, and cross-layer security.

There can be some components which you may have to build from scratch and for others, it can be managed with the IoT solutions provider company. It depends entirely on the cost of ownership. Cost of ownership is the upfront fee to procure the platform, service fee, customization charges, and the cost of upgrades to adapt to dynamic business ecosystem. 

Is the platform scalable enough

The IoT vendor that you choose should be flexible when it comes to aligning its technologies with your legacy architecture. Make sure there are no limitations and that their technology should be easier to deploy without causing any delays. 

Many vendors will speak about flexibility but not all of them are equipped enough to offer it. The number of devices is increasing, due to that, you will definitely require a lot of customization and personalization. 

The vendor that you choose should be transparent about how extensible the platform is and whether there is adequate scope to add new features without hampering the existing system.

Is the platform capable enough to handle huge queries?

There is no doubt that the number of connected devices continues to grow, and will keep on going. This will pose the need for scalability more than ever. In fact, this might even become a prinary concern for most enterprises.. 

This will also mean that the costs that come associated with data management and hardware, will continue to rise with every added device. You need to keep the amount of scalability clear with the vendor. Ask them what is the highest they can offer.

Are they competent enough to handle complexities which more number of devices bring along. The  agility and ability of the vendor are of critical importance.

Do they offer real-time monitoring and data analytics

The ecosystem of data analytics is heavily crowded, and the right vendor at the right time can be all you need to break from the pack. There are four main things when it comes to IoT: things, data, people, and processes. 

With the help of networked connections, vendors are able to understand their relationships better and present insights that can take businesses to the next level. With real-time data and actionable insights, vendors can alert you about the issues that were not even there on your radar and help make more informed, intelligent decisions.

Conclusion

The entire arena of IoT is thriving, and is soon going to become the Internet of Everything. Working seamlessly with these connected smart devices can accelerate the businesses effectively. There are always pointers and directions one can follow, the final decision rests in your hand.

Read more…

We had gone from a time when the video call was deemed stuff of the future to being able to switch on appliances like refrigerators, air conditioners, microwaves, and more remotely, i.e. from wherever you are. The latter is the outcome of this nifty phenomenon called the Internet of Things. Moreover, while a lot of us may have been struggling to wrap their head around the fact that pretty much everything can be connected to everything, IoT has already evolved to give the world with what is now referred to as the Industrial Internet of Things, a.k.a. IIoT.

3473196100?profile=RESIZE_710x

Though, IIoT is fundamentally similar to IoT; the former is differentiated from the latter utilizing the targeted environment. As the name suggests, IIoT is meant for industrial purposes. Under the purview of IIoT, equipment, including all types of machines and sensors, are connected to the internet to communicate with each other. The data generated by the connected equipment is stored and processed to deliver a plethora of benefits to companies, such as improved management of the facility, predictive maintenance, and more. It also helps companies to leverage their EHS data in a substantially better manner. To help you understand the potential of this combination, we have compiled a list of the top benefits it delivers.

  1. Employee safety: With wearable devices, including personal protective equipment, have played a crucial role in transforming how companies ensure the safety of their employees. It is done in a million different ways, such as by detecting human presence far too near equipment, sounding alerts, and switching off the machine in question. It can also be used to identify abnormal levels of specific gases, chemicals, and more via sensors on employees’ person and prevent any untoward incident.
  2. Keep an eye on equipment: Unforeseen downtime for equipment can translate into massive losses for the company. Whereas for employees, it can mean a risk to their safety. In this context, IIoT collects data on all equipment in the facility, makes use of advanced analytics and machine learning to predict faults, if at all. In addition to that, the data thus gathered can also be used to monitor maintenance schedules and even predict if a particular piece of machinery may need an unscheduled service in the future.
  3. Environmental management: Industries make use of a variety of devices that serve to help them with their environmental management-related efforts. Case in point, continuous emissions monitoring systems — they keep an eye on the emission levels of things like particulate matter, dangerous organic compounds, and more to help businesses ensure compliance with emissions-related regulations with absolute ease.

The digital world has long proven that it is a potent sea of advanced technology-based tools that can bring on transformation in the blink of an eye. IIoT is a prime example of technology’s prowess. When combined with workplace health and safety management software, businesses substantially gain access to a robust tool that will assist their endeavors in the context of gathering, tracking, and processing data that will fortify their EHS efforts.

Read more…

IoT and CRM, the buzz words of the 21st century, are now a reality and would soon bring the great industrial revolution across the world. With the advancements in technology and the internet, it’s not only humans who are connected via the internet, but also the devices which are getting connected through this marvel technology.

 IoT(internet of things) as a game-changer is becoming a crucial technology in different industries and integrating innovative ways to bring success to an organization.

As per a report by Gartner, there will be around 20 billion IoT devices by 2020.

IoT and CRM

IoT is the connection of the devices via internet while CRM is the collection of customer’s data through data mining, giving useful insight into the customer behavior for segmenting the market and targeting the campaign effectively. With the empowerment by IoT, CRM helps to manage relationships with the customer and facilitates in achieving the goal of an organization.

As per another report by Gartner, CRM will be the heart of the digital initiatives for many years to come.

Who mainly benefits from CRM?

  • Small businesses looking for rapid growth: CRM can take off the burden from the IT management team by automating the business process. It further helps the employees to keep the focus on the critical areas which needs human intervention.
  • Top industry leaders looking for large scale solutions: It simplifies and improves the complex engagements with a customer. Some of the top-level executives like CEOs, CIOs, CMOs require advanced tools to streamline the business and technical process of an organization and with a wide range of CRM tools it can be scaled to meet the requirements of any organization.

It should be acknowledged that with IoT, CRM can evolve to a much developed and advanced version of the technology. The combination can help in making sense of the past enterprise data, and connecting it with the real-time data through the “devices.” The combined technology can help all the departments across the organization, be it sales, marketing, or customer service.

Find out some of the best results which businesses can achieve through this integration:

1. Optimized customer service:

Have you ever thought of, fixing the errors before the customer notices it!!!!

No product in the market is entirely error-free. For a marketer, it is a nightmare when a customer complains about their product and that too on a widely-used social media platform. It can hurt a company’s reputation as negative publicity spreads fast like the wildfire of Amazon. This scenario can be easily evaded with predictive analysis, and with the right integration of CRM and IoT. It helps to push away the major lapses, which can demotivate a customer in purchasing further services or products of the same brand.

 Majority of the manufacturers are already reaping the benefits of connecting their CRM with the IoT devices. As they are partly responsible if a product does not provide the service as per the expectations of a customer, they can make the product 100% efficient with the right collection of the customer data and the product specifications needed by the customer.

Customer service as one of the essential support to generate high revenue for the organization needs an advanced version of the technology, which helps to understand the customer with the right information.  IoT with CRM is a perfect guide in this circumstance as it is the right combination of technology and customer relationship management process of the organization.

 As businesses vie up for the same customer, the one providing the best and optimized customer service will be surely a winner in this race.

2. Increased sales:

The consumer market has evolved over the years, and customers are highly valuing service over others, before making the final decision. An efficient service, which involves providing precise solutions to the business challenges of the customers at the right time, significantly improvises the business process and increase sales.

An increasing number of organizations are leveraging IoT technology to increase sales opportunities.

3. Next-generation CX: Customer experience (CX) is the sum of the customer journey throughout the business cycle with your organization. IoT and CRM pave the path for the next-generation CX as the IoT related data which provide predictive analysis enables proactive support leading to some of the best customer experiences. By using customer information on the location, preference, status, and others, the problem can be predicted and resolved at the right time.

4. Omnichannel in-store experience: CRM and IoT can provide an immersive and omnichannel in-store experience. Store owners can know what the customer is looking for, what are his preferences, etc. It would also help in suggesting the products which the customer might purchase.

5. Customer retention: As CRM provides the complete customer data, it can help in better understanding of your customers. The IoT data and customer data build up a unique combination in streamlining the marketing approach and targeting the existing customer. The whole process helps to retain the existing customer, a challenge in the current market scenario.

What are the benefits of IoT and CRM integration?

It influences customer engagement to a great extent and provides:

  • A higher degree of personalization
  • Molding of the marketing process
  • Helping to change the prices as per the demand
  • Higher revenue and sales for the organization
  • Increased customer satisfaction

Conclusion:

 As an organization, one can discover advanced ways of connecting with the customers, when IoT and CRM are enabled to work together as a connected enterprise.

 IoT is the new channel which holds great promise for CRM. The small and mid-sized businesses, along with the large enterprises equally, could reap the benefits of this amalgamation. The interaction of the devices with intelligent systems opens up a complete new world for delivering personalized services and exceptional support.

Read more…

I believe, that Apple is the most important IoT company. I believe this, not because, with the iPhone, Apple has brought up a different category of smartphones, but it keeps on setting the gold standards for what this device can do. The seamless, effortless integration of the whole product line of the apple, has given the company an advantage which no other mobile company can surmount. It is not the only reason for apple products being in the limelight. Nowadays, every consumer-focused IoT application works well with smartphones but the iPhone was the first device to display the power of connected sensors. With the help of the iPhone, many companies were able to amass the incredible amount of data.

Today, I will be discussing one of the hot technologies, that is in buzz since its birth that is IoT.

IoT stands for the Internet of things and is a hot technology nowadays. The 'things' in IoT can be any device embedded with software, electronics, and sensors. It provides an ability to transfer data over the network without any manual intervention. The network in IoT devices is decided on factors like range, security, power, and data. These factors are responsible for the choice of the network, which will be established such as Wifi, Bluetooth, internet, and any other.

Now, let us look at the reasons made IoT, a hot technology:

Technical Optimization
It helps in improving the technologies and giving a better experience to the user. For eg, IoT can provide car manufacturers, the data from various car sensors to make the car more efficient and to improve the car design.

Reduced Waste
It provides real-time updates to the users helping in making a better decision. It also leads to better management of the resources. For eg, If the manufacturer finds a fault in multiple items of the product, then by tracking the manufacturer's plan, he will be able to resolve the issue through the manufacturer belt.

Customer Engagement
IoT improves the customer experience by detecting the problems in the system and improving the issue. For eg, any issue in the car will be notified by the sensors alerting both the driver and the manufacturer. By the time the driver reaches the service station, the manufacturer will be ready with the solution.

Data Collection
Traditionally, data collection was limited and had a passive use. But with IoT, it has become easy to collect data as it facilitates immediate action on data.

There are many reasons other than these, which accelerate the market of IoT but these are some of the major reasons for the increased popularity of IoT devices and made every consumer-focused business owner to hire an iPhone app development company
 to get the iPhone app build having an IoT feature.

Parting Thoughts

With this, I end up the article on why you should build an iPhone app having IoT features. I hope, by now, you have understood the concept. While looking at today's world of technologies, it clearly indicates how IoT will be implemented in the future. The world of connection of devices, people, and data generates more business opportunities for many sectors. With the decrease in IoT components, the cost of IoT linked devices have become more affordable. Eventually, making more people to use IoT Linked devices. The usage of the internet is increasing day-by-day and IoT is the concept that allows multiple devices to stay connected and communicate with each other with the help of the internet. It is the only reason behind the concept of smart grids, smart cities, smart homes, and intelligent transportation. With all this, I can say that the future is the Internet of Things.

Read more…

When Refrigerators Attack - How Cyber Criminals Infect Appliances, and How Manufacturers Can Stop Them

 

Alan Grau, VP of IoT, Embedded Systems, Sectigo

 

Homes and businesses worldwide are vulnerable to attacks from cyber thieves and other bad actors – and not just through their computer networks. The embedded electronics inside appliances present an easy path of entry. It’s already been happening. According to Business Insider and Proofpoint, one of the first refrigerator incidents occurred in late 2013 when a refrigerator-based botnet was used to attack businesses.

 

Some of these attacks, such as infecting appliances with botnet malware, don’t really have much effect upon a family’s security and safety. In fact, if a “smart” refrigerator gets infected by a bot, the homeowner might not even notice anything wrong.

 

However, connected-appliance based cyberattacks are not limited to just refrigerators – and they are rarely one-off incidents. Almost any type of appliance can be hacked and used to host a botnet that could attack the web. According to Wired Magazine, a botnet of compromised water heaters, space heaters, air conditioners and other big power consuming home appliances, could suddenly turn on simultaneously, creating an immense power draw that could cripple the country’s power grid.

 

A bot, quite simply, is an infected computer. Many cyberattacks, like the Mirai Malware and the Dyn attacks, infect a network of computers, including “smart” connected devices such as home appliances, security cameras, baby monitors, air conditioning/heating controls, televisions, etc., and turn them all into compromised servers. These compromised servers then act as nodes in an attack and together create a botnet. They can participate in a variety of coordinated attacks, infecting other devices and expanding the network of bots, or participating in Denial of Service attacks.

 3423923119?profile=RESIZE_710x

Caption: A bad actor or cyber criminal can send infected messages to a home or business network that targets various appliances or machines. Once infected, that machine is under the control of the bad actor and can be used to send out thousands of infected messages to new targets worldwide. The botnets can also send out millions of dummy messages to a single target – overwhelming it and putting it out of service. 

 

 

 

 

 

 

  

Without any apparent symptoms or notice, a criminally enhanced refrigerator could be generating and sending out thousands of attacks every minute. In addition to the homeowner or business manager never realizing what is going on, these attacks may be unstoppable until unless the machine itself is disconnected from its web connection.

 

Additionally, the infected refrigerator could spread malware from the kitchen to the home’s “smart” TVs, to the home’s computer networks, to other smart devices in the home, and even to connected smart phones. Every target could be transformed into malicious bots that distribute millions of infected spam messages and cyber-attacks.

 

So how do we combat this threat?

 

Unfortunately, end users really have no power to fix this problem. There is probably no way for a homeowner, office manager – or even an experienced refrigerator repair person – to talk to a refrigerator’s electronics. No way to get into the appliance’s software and middleware to identify and kill an infection. However, if the homeowner suspects an infection, they could disconnect the refrigerator from the its internet connection to make it “dumb” again.

 

3423925048?profile=RESIZE_710x

Fridge caught sending spam emails in botnet attack - In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

It is up to device manufacturers to protect against these attacks. 

 

So how do manufacturers combat this type of attack? How can they ensure that appliances in homes and offices do not get infected to cause mayhem?

 

Security starts in the design process for the refrigerator itself, as well as for the appliances’ various electronic components and control surfaces. Most appliance manufacturers get their control sub-assemblies from a wide network of smaller manufacturers, sometimes with a worldwide supply chain. These suppliers need to make sure that the chips and sub-assemblies they use are secure from hacks.

Two important security practices can be utilized by appliance makers:

 

  • Embedded Firewall with blacklist and whitelist support – Protect appliances and edge devices from attacks by building firewall technology directly into the appliance. An embedded firewall can review incoming messages from the web or over the home network and, via a built in, and regularly updated blacklist, reject any that are not previously approved.

 

  • Secure Remote Updates and Alerts – Validate that the firmware inside the device is authenticated and unmodified before permitting installation of any new firmware updates. Updates ensure the incoming software components have not been modified and are authenticated software downloads modules from the appliance manufacturer.

 

Most consumer and device manufacturers have heard about the potential for attacks on smart devices like door locks, baby monitors, and home thermostats, but this risk awareness needs to expand to types of connected systems – including appliances. An infected refrigerator sending out malware is not just a funny story. These systems have been attacked and used to spread malware.  Ensuring the security of these devices is necessary to protect home network, slow the spread of malware and even protect credit card numbers or other personal data stored in smart home devices.

 

# # #

 

EXTRA PROOF POINT FOR COLUMN

 

Refer to: https://www.cnet.com/news/fridge-caught-sending-spam-emails-in-botnet-attack/

 

 

 Author Bio - Alan Grau, VP of IoT, Embedded Solutions, Sectigo

 

Alan has 25 years of experience in telecommunications and the embedded software marketplace. He is VP of IoT, Embedded Solutions IoT at Sectigo, the world’s largest commercial Certificate Authority and provider of purpose-built, automated PKI solutions. Alan joined Sectigo in May 2019 as part of the company’s acquisition of Icon Labs, a leading provider of security software for IoT and embedded devices, where he was CTO and co-founder, as well as the architect of Icon Labs' award-winning Floodgate Firewall. He is a frequent industry speaker and blogger and holds multiple patents related to telecommunication and security.

 

Prior to founding Icon Labs, Alan worked for AT&T Bell Labs and Motorola.  He has an MS in computer science from Northwestern University.

 

About Sectigo

 

Sectigo provides award-winning, purpose-built and automated PKI management solutions to secure websites, connected devices, applications, and digital identities. As the largest commercial Certificate Authority, trusted by enterprises globally for more than 20 years, and more than 100 million SSL certificates issued in over 200 countries, Sectigo has the proven performance and experience to meet the growing needs of securing today’s digital landscape. For more information, visit www.sectigo.com.

 

Read more…

Upcoming IoT Events

More IoT News

Answering your Huawei ban questions

A lot has happened since we uploaded our most recent video about the Huawei ban last month. Another reprieve has been issued, licenses have been granted and the FCC has officially barred Huawei equipment from U.S. networks. Our viewers had some… Continue

IoT Career Opportunities