Microsoft sees the Internet of Things as a potential playground for attackers, and has introduced new tools and services designed to improve IoT security.
Some 9 billion IoT devices powered by microcontroller units (MCUs) come online annually, with an expected 20 billion total by 2020 and 80 billion by 2025, Microsoft Corp. (Nasdaq: MSFT) said at its Ignite customer and partner conference in Orlando, Fla. last week. Many of these devices aren't secured, either because it's too expensive for manufacturers to secure them, or because it previously wasn't thought worthwhile.
For an example of latter, consider the case of the Las Vegas casino that was successfully hacked through a fish tank thermometer. Reasonable people might think that there's no good reason to secure a fish tank thermometer, because the harm that an attacker can do is small -- just kill some fishes. However, in this case, the thermometer was network-connected, so attackers were able to use the thermometer as a foothold to get on the casino's enterprise systems and steal the casino's high-roller database, according to Microsoft.
Microsoft Ignite conference, Orlando, Fla., last week.
Now entering its fifth year, the 2020 Vision Executive Summit is an exclusive meeting of global CSP executives focused on navigating the disruptive forces
at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.
"The MCU devices are the dark matter of the computing universe," Galen Hunt, Microsoft distinguished engineer and Azure Sphere partner group program manager, said in an interview. "They outnumber everything else ten to one and they haven't been connected until now."
For more about the potential threat of IoT devices, and Microsoft's latest steps to help developers secure against that threat, see our Light Reading article: Microsoft Secures IoT 'Dark Matter'.
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.