Brian Shea: When Considering MDR, Think about What You Need to Accomplish
“An underlying driving force behind MDR is the need to spot threats earlier, respond to them faster, and mitigate them before they become serious incidents.” The big difference between a managed detection and response (MDR) service and traditional security...
GoSecure: 7 Experts on Transitioning to Managed Detection and Response
The book includes insights from the following experts: Brian Shea, Revolution Group, Chief Information Officer and Practice Director, Technical Services, Read the article here >> Erica Wilson, Cass Information Systems, Vice President, Chief Information Security...
Kamaljit Singh: IoT Security Begins with Secure Boot
“If you don’t have a secure boot mechanism inside that device, then every other security measure will fail. There is no use having any security on the device if you don’t have secure boot.” To design secure Internet of Things (IoT) devices, engineers must consider the...
Thomas Mosel: IoT Solution Security Must Be a Product Life-Cycle Consideration
“If somebody compromises an office building climate system to change the temperature, that is inconvenient. If someone increases temperatures in a hospital, that could kill people.” Thomas Mosel, Principle Product and Solution Security Officer for smart infrastructure...
Mohan Kulkarni: When Designing Secure Devices, Don’t Forget the Supply Chain
“Hardware and data protection are critical areas from a technical risk perspective.” Mohan Kulkarni, Product Manager at PMD Solutions, stresses that device security must be considered at the earliest stages of the Internet of Things (IoT) design and engineering...
Jonathan Cartrette: Hardware Authentication Is the Foundation of a Secure IoT Ecosystem
“It is impossible to do a good job of protecting firmware integrity if you do not have hardware you can trust.” Internet of Things (IoT) security begins with hardware authentication. “You’ve got to sign the hardware if you are going to have ecosystem-level rights...
Ivan Fumagalli: IoT Solution Security Must Be a Product Life-Cycle Consideration
“Using the currently available version of the software is important, which means staying in touch with chip and operating system builders.” When building an [Internet of Things] IoT solution, you can’t always use the best security because the market will not pay for...
Debasis Bisoi: To Build Secure IoT Devices, Security Can’t Be an Afterthought
“When you do something as an afterthought, it becomes extremely difficult to bake it back into the design.” Building security into Internet of Things (IoT) devices has become a primary design consideration because of the changing nature of these devices. Debasis...
Chris Kim: IoT Security Is Often Driven by Business Considerations
“It’s easy to brick a device if you don’t upgrade it correctly.” Many challenges that designers and engineers face when developing secure Internet of Things (IoT) products come down to cost and complexity. How engineers address those issues directly relates to the...
Cypress and Mouser Electronics: 7 Experts on IoT Security and Privacy
Chris Kim, Founder, UNION Labs, Read the article here >> Debasis Bisoi, Vice President & Head, Manufacturing-Aerospace & Process Industries Vertical, Tech Mahindra, Read the article here >> Ivan Fumagalli, Project Manager, Robertshaw, Read the...