IoT Security is a concern with a solution waiting to happen. Join us for EE Times Radio show in this episode of Engineering the Internet of Things. Our guest is Leigh-Anne Galloway, Cyber Security Resilience Lead at Positive Technologies.
It’s clear that the Internet of Things is completely changing the way we interact with technology. Today, your cell phone can remember where you parked your car and even suggest when you should leave to arrive on time for your next appointment. This synergy between function and highly detailed data collection enables greater intelligence and more advanced autonomous capabilities. For example, vineyards can automatically monitor crops to make sure grapes are getting the right amount of water. Similarly, smart factories can track inventory as it goes through the production line. The result is substantial gains in efficiency while driving down operating costs.
Oh, and a whole mess of security issues.
It’s easy to ignore the fact that connecting devices to the Internet exposes your entire IoT ecosystem to the risk of being hacked. That is, until your own IoT network is compromised. Then you get to see the impact on your bottom line and your company’s reputation firsthand.
In this episode of Engineering the Internet of Things, my guest is Leigh-Anne Galloway, Cyber Security Resilience Lead at Positive Technologies. Leigh-Anne started her career leading investigations into payment card breaches where she discovered her passion for security advisory. Since then, she has worked with a diversity of companies implementing monitoring tools to detect and prevent fraud and security incidents from occurring. She has also worked with companies such as SilverTail Systems and vArmour where she helped shape the direction of their detection platforms. Today, she advises organizations on how best to secure their applications and infrastructure against modern threats.
Leigh-Anne shares her expertise on how security relates to IoT-based systems. The typical requirement for IoT nodes – low power, small form factor, tiny processor, minimal cost – just make security even more difficult to apply effectively than it is for networks and other Internet-based technologies. While there is no panacea available to assure secure operation of your IoT ecosystem, Leigh-Anne offers surprisingly straightforward advice for handling the complexity of security no matter what your IoT-based application is.
Join us as we reach beyond the hype to explore the edge’s of what’s possible with IoT technology and how we’re going to get there.