Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Debunking Three Cyber Insurance Myths For SMEs
Experts On Russia Being Held Accountable For SolarWinds
Security Expert Re: NSA Urges Organizations To Patch...
How To Protect Your Enterprise When You Can’t...
Expert Insights: Dir Nat’l Intelligence Releases Annual Threat...
Expert Advice Developers to Improve Software Security After...
Expert Reaction on Research that Coronavirus Triggering Surge...
Expert Comment On DPC Facebook Investigation
Apple Quietly Updated Some Of Its Top Hardware...
Security Researcher “Chrome 0day” Tweet – Expert Insight
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Ellen Boehm
Senior Director of IoT Product Managementfeature_status*/ ?>
Keyfactor

Comments Dotted : 3
January 14, 2021

Physical Access To The Capital: Potential Security Risks

Ethernet jacks could be replaced with hidden, embedded devices.

If IoT devices are improperly managed due to lack of code signing, secure communications and mutual authentication they could be vulnerable to exploit. A good example is if an unauthorized person can physically access a device, they can install malicious firmware onto a vulnerable device. If that device does not have proper code signing or secure bootloading implemented, it could be impacted. This kind of scenario could result in a national security issue that, at minimum, would hinder

.....Read More

If IoT devices are improperly managed due to lack of code signing, secure communications and mutual authentication they could be vulnerable to exploit. A good example is if an unauthorized person can physically access a device, they can install malicious firmware onto a vulnerable device. If that device does not have proper code signing or secure bootloading implemented, it could be impacted. This kind of scenario could result in a national security issue that, at minimum, would hinder congressional operations while the affected equipment is quarantined, analyzed or replaced.

 

Last year, we released research that looked at the risks of low entropy and its ability to break IoT devices. What we found was that 1 in every 172 outbound connections relying on a target endpoint's RSA key confidentiality could be intercepted. Applying those findings here, that scenario could allow hostile parties to tamper with communications infrastructure. Ethernet jacks could be replaced with hidden, embedded devices that could run a man-in-the-middle (MitM) attack on selected traffic. Someone with physical access could also perform internet scans, running an analysis like our research, which could identify vulnerable connections. With that information, they could load broken server keys onto a device that could decrypt traffic whenever a request is made to a compromised domain. It might sound unbelievable, but it is not farfetched – the U.S. Capitol is a prime example of a high-value target and it is reasonable to consider that physical access could provide a communication path to perform a MitM attack. This kind of exposure significantly broadens the attack surface that security personnel must consider as they sweep for bugs and such as they re-secure the premises.

  Read Less
Like(0)  (0)

Linkedin Message

@Ellen Boehm, Senior Director of IoT Product Management, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ethernet jacks could be replaced with hidden, embedded devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/physical-access-to-the-capital-potential-security-risks

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Ellen Boehm, Senior Director of IoT Product Management, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ethernet jacks could be replaced with hidden, embedded devices...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/physical-access-to-the-capital-potential-security-risks

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 05, 2021

Cyber Security Predictions 2021: Experts’ Responses

IoT devices lack the power and compute resources necessary to handle random key generation.

This year, the proliferation of IoT and inherent security risks have become a larger focus for CIOs in enterprise. Security has always been a concern, but with a growing reliance on IoT for broader business operations - especially in our remotely connected world - keeping IoT secure is priority.

 

Expect to see the conversation focus on device production and what IoT device makers are doing to build security into devices at design and ensure security through the device lifecycle. First and

.....Read More

This year, the proliferation of IoT and inherent security risks have become a larger focus for CIOs in enterprise. Security has always been a concern, but with a growing reliance on IoT for broader business operations - especially in our remotely connected world - keeping IoT secure is priority.

 

Expect to see the conversation focus on device production and what IoT device makers are doing to build security into devices at design and ensure security through the device lifecycle. First and foremost, cryptographic measures at design will be crucial to ensure secure software and firmware updates over time. Unique identities at design are critical for all personal and commercial IoT devices. 

 

Technically speaking, modern IoT devices have constraints that prevent them from producing highly random keys. Devices rely on an assigned key, or digital identity, to protect them from exploit and allow controlled access and secure updates.  IoT devices lack the power and compute resources necessary to handle random key generation - which means that countless life-critical and high risk devices (including connected vehicles, aircraft and medical devices) could be vulnerable to attacks and exploits.

 

Connected IoT devices – everything from diesel engines to medical devices – are developed in one location, manufactured in another, then shipped into untrusted networks for operation. Device manufacturers need to ask themselves how they can ensure that devices can be managed, updated and protected at all times in these untrusted and remote environments.

 

IoT manufacturers will also be looking to add more flexibility into their supply chain strategy but employing tools and technologies that give them options when it comes to where to produce products. This allows manufacturers to optimize production based on economic cycles and respond more quickly to the market needs. When it comes to IoT devices specifically, it’s essential that each device is produced with a unique, traceable identity, and that the root of trust is established securely, independent of the factory where the device is actually built.

  Read Less
Like(3)  (0)

Linkedin Message

@Ellen Boehm, Senior Director of IoT Product Management, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"IoT devices lack the power and compute resources necessary to handle random key generation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-security-predictions-2021-experts-responses

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Ellen Boehm, Senior Director of IoT Product Management, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"IoT devices lack the power and compute resources necessary to handle random key generation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cyber-security-predictions-2021-experts-responses

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 25, 2020

IoT Cybersecurity Improvement Act Of 2020 – Expert Source

The only way to improve our security posture is to design a robust security architecture around our entire IoT systems.
Any time there is an initiative around improving cybersecurity for IoT devices, independent of industry, it helps the collective market challenge the current state and think deeper about best practices around encryption and authentication for this growing population of connected things. We frequently hear about hackers who take advantage of weaknesses in IoT security, maliciously taking control of smart home devices for DDoS attacks or changing functionality of medical devices. The only way to.....Read More
Any time there is an initiative around improving cybersecurity for IoT devices, independent of industry, it helps the collective market challenge the current state and think deeper about best practices around encryption and authentication for this growing population of connected things. We frequently hear about hackers who take advantage of weaknesses in IoT security, maliciously taking control of smart home devices for DDoS attacks or changing functionality of medical devices. The only way to improve our security posture is to design a robust security architecture around our entire IoT systems. Guidelines provided by NIST or other standards groups can really make an impact in how we design security into IoT devices from inception and provide a method to manage authentication and encryption around the IoT device data and functionality over time.  Read Less
Like(2)  (0)

Linkedin Message

@Ellen Boehm, Senior Director of IoT Product Management, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The only way to improve our security posture is to design a robust security architecture around our entire IoT systems...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/iot-cybersecurity-improvement-act-of-2020-expert-source

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Ellen Boehm, Senior Director of IoT Product Management, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The only way to improve our security posture is to design a robust security architecture around our entire IoT systems...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/iot-cybersecurity-improvement-act-of-2020-expert-source

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Kevin Mandia, CEO, FireEye

"This is a positive, welcome step towards adding more friction to Russian operations. "

Experts On Russia Being Held Accountable For SolarWinds

Tony Cole, CTO , Attivo Networks

"The impact from all the actions taken by the US government? It’s undetermined at this point in time. "

Experts On Russia Being Held Accountable For SolarWinds

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

"The good news in the statement fact sheet is the part where the US government support a Global Cybersecurity Approach. "

Experts On Russia Being Held Accountable For SolarWinds

Jayant Shukla, CTO and co-founder, K2 Cyber Security

"Virtual patching is a feature of runtime application security solutions like RASP. "

Security Expert Re: NSA Urges Organizations To Patch Top Vulnerabilities Exploited By Russia

Saryu Nayyar, CEO, Gurucul

"The best defense is a full-stack offense which again includes cyber defenses powered by machine learning like security analytics. "

Expert Insights: Dir Nat’l Intelligence Releases Annual Threat Assessment Thursday

Garret F. Grajek, CEO, YouAttest

"My fear as an identity professional for 30 years is that more regulation will occur because of the threat. "

Expert Insights: Dir Nat’l Intelligence Releases Annual Threat Assessment Thursday

Craig Sanderson, VP of Security Products, Infoblox

"These incidents give us an opportunity to take a look at potential prevention steps. "

Expert Advice Developers to Improve Software Security After NAME:WRECK Disclosure

John Smith, Solution Architects EMEA and APAC, Veracode

"The potential impact of exploiting the NAME:WRECK vulnerabilities are substantial, but software flaws are not a new threat for businesses. "

Expert Advice Developers to Improve Software Security After NAME:WRECK Disclosure

Stephen Bradford, SVP EMEA, SailPoint

"When speed trumps security, we’re increasingly exposed to cyber fraud. "

Expert Reaction on Research that Coronavirus Triggering Surge in Cyber Fraud

Chris Strand, Chief Compliance Officer, IntSights

"The DPC was instrumental in enforcing a fine on Twitter when 32.8 million credentials ended up online last year. "

Expert Comment On DPC Facebook Investigation

Jake Moore, Cybersecurity Specialist, ESET

"Apple are likely to have suspected a threat to the hardware if this had got out, hence why it was kept under wraps. "

Apple Quietly Updated Some Of Its Top Hardware Due To Security Risks

Satnam Narang, Senior Research Engineer, Tenable

"We strongly encourage users and organizations alike to ensure they are patching their browsers like Chrome and Edge as soon as possible. "

Security Researcher “Chrome 0day” Tweet – Expert Insight

Steve Forbes, Government Cyber Security Expert, Nominet States

"It is vital that governments pay close attention to the resilience of their critical infrastructures. "

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Saryu Nayyar, CEO, Gurucul

"The good news is that it appears the only damage is financial, and likely temporary. "

Industry Leaders On Android.Joker Malware

Eddie Glenn, Senior Product Manager, Venafi

"These timestamps indicate that the code signing certificate was valid at the time it was used to sign the code. "

Expert Reaction On Pulse Secure VPN Users Can’t Login Due To Certificate Related Outage

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel