Security

New IoT security podcast series

Share this post:

This five part podcast series examines the facts that should be considered by individuals and companies when building and deploying IoT devices and solutions. Hosted by Diana Kelley, Global Executive Security Adviser, each week a panel of IBM security experts, including Tim Hahn, Distinguished Engineer, Chief Architect IoT security; Andras Szakal, VP, CTO for IBM Watson US Federal and James Murphy, Offering Manager IoT Security share their opinions and insights about the industry.

Devices operate in hostile environments

The first podcast tackles how IoT devices often operate without human supervision and they must therefore be rugged and resistant to physical tampering. Without human involvement, they much be able to recover from an attack and fail safely.

Software security degrades over time

The second podcast allows the panel to discuss how managing software updates is always a challenge, but additional difficulties arise when IoT is involved. Ensuring software stays up-to-date for IoT devices can become a never-ending task. The risk of attack continues to increases with the length of time your connected car or smart refrigerator remains in service.

Shared secrets don’t remain secret

The third podcast states how millions of IoT devices come preloaded with identical passwords. Those who choose to leave their passwords as the default settings may be sharing their data with hordes of strangers and leaving their devices vulnerable.

Weak configurations persist

The penultimate podcast looks at how changing the default configurations of an IoT device takes thought and effort, and unfortunately for this reason, it doesn’t happen. Device manufacturers should make security options mandatory to change by default or as part of an initial setup process when the end user first receives the device.

As data accumulates, exposure issues increase

The final podcast emphasizes how IoT devices are continuously collecting huge amounts of personal and sensitive data. The Thing that the data represents can vary from a human, a building or even a car and many more. The data pertaining to these Things can be very specific such as heart rate or GPS locations. All of these factors mean that there are significant privacy and security challenges that need to be considered in the IoT.

Learn more

  • You can listen to the podcasts in full here, or take a look at the infographic.
  • To learn more about how IBM can help your organization improve its security environment and take advantage of IoT technology visit our website or to see more on IoT and security, visit here.
  • To read further about how to protect and clean out your data for better security, head to this blog.
More Asset Management stories

Top Takeaways from IoT World 2019

Written by Sarah Dudley | May 20, 2019 | Asset Management, Manufacturing, Platform

The total number of Internet of Things (IoT) devices is expected to hit 10 billion by 2020. With this explosion of growth also comes an uptick in the conversations around how to use these devices and the data they generate to improve our businesses and our lives. At IoT World, North America’s largest IoT event ...read more


And the winner is……Watson IoT at the IoT World Awards 2019!

Written by Sarah Dudley | May 17, 2019 | Asset Management, Platform

It’s been an exciting week as more than 12,000 people converged on the Santa Clara Convention Center for Internet of Things World 2019! Topics have spanned from connected cars and smart buildings to Industry 4.0 and developing an IoT Platform. In the full recap going out in the next few days, we will highlight the ...read more


Do you know the price of poor infrastructure?

Written by Stephen Russo and Bruce D Baron | April 24, 2019 | Asset Management

Over the last 20 years, huge investments have been made in metropolitan areas to understand the immense volume of data collected about the citizens inhabiting these cities. Hundreds of millions of dollars have been spent combining data with emerging mobile, sensor and machine learning technologies. This is all done with the goal to improve infrastructure ...read more