{"id":5855,"date":"2014-06-13T06:00:36","date_gmt":"2014-06-13T13:00:36","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5855"},"modified":"2014-07-16T08:23:56","modified_gmt":"2014-07-16T15:23:56","slug":"lets-ignore-security-internet-things","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/06\/lets-ignore-security-internet-things\/","title":{"rendered":"Let\u2019s Not Ignore Security in the Internet of Things"},"content":{"rendered":"<p>The more we talk about the Internet of Things (IoT) the more we have to talk about securing it. Gartner <a href=\"https:\/\/www.gartner.com\/doc\/2625419\" rel=\"nofollow,noopener\"  target=\"_blank\">forecasts<\/a> that by 2020, the IoT will comprise 26 billion devices and will generate incremental revenues of $300 billion, along with some $1.9 trillion in what the researcher describes as \u201cglobal economic value-add through sales into diverse markets.\u201d<\/p>\n<p>But before we start seeing <a href=\"http:\/\/money.cnn.com\/gallery\/technology\/2012\/09\/18\/internet-of-things\/7.html\" rel=\"nofollow,noopener\"  target=\"_blank\">wireless diapers<\/a> and connected <a href=\"http:\/\/www.steadyserv.com\/\" rel=\"nofollow,noopener\"  target=\"_blank\">beer kegs<\/a> everywhere, there are significant concerns about IoT and security that need to be addressed. Every IoT security headline, whether it\u2019s about <a href=\"http:\/\/www.nbcnews.com\/tech\/security\/man-hacks-monitor-screams-baby-girl-n91546\" rel=\"nofollow,noopener\"  target=\"_blank\">hacked baby monitors<\/a> or compromised <a href=\"http:\/\/www.forbes.com\/sites\/ericbasu\/2013\/08\/03\/hacking-insulin-pumps-and-other-medical-devices-reality-not-fiction\/\" rel=\"nofollow,noopener\"  target=\"_blank\">insulin pumps<\/a>, is a reminder that as a community, we\u2019re still weighing the benefits of a hyper-connected lifestyle against potential security risks.<\/p>\n<p>At Palo Alto Networks we\u2019re in constant discussion about how the IoT concept will affect different enterprises and markets, from healthcare to retail, as well as how a next-generation enterprise security platform is crucial to securing so much connectivity. Here are a few recent examples of our global colleagues sharing IoT insights:<!--more--><\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/sharat-sinha\/\" target=\"_blank\">Sharat Sinha<\/a> talked with MIS Asia about the challenges of securing so many IP-enabled devices<\/li>\n<li>Arthur Capella offered IoT security perspective for Brazil\u2019s <a href=\"http:\/\/corporate.canaltech.com.br\/noticia\/seguranca\/Internet-das-coisas-seguranca\/\" rel=\"nofollow,noopener\"  target=\"_blank\">CanalTech<\/a> (Portuguese)<\/li>\n<li>Gavin Coulthard addressed securing SCADA infrastructure with <a href=\"http:\/\/www.radiocomms.com.au\/articles\/67712-Securing-a-SCADA-network-from-attack\" rel=\"nofollow,noopener\"  target=\"_blank\">CommsCritical<\/a> in Australia<\/li>\n<li>Armando Decal shared four best practices for securing IoT devices with <a href=\"http:\/\/techday.com\/it-brief\/news\/the-increasing-challenge-of-securing-the-internet-of-things\/185141\/\" rel=\"nofollow,noopener\"  target=\"_blank\">TechDay<\/a> and <a href=\"http:\/\/www.zdnet.com\/iot-security-under-scrutiny-as-apple-looks-at-smart-home-system-7000029859\/\" rel=\"nofollow,noopener\"  target=\"_blank\">ZDNet<\/a><\/li>\n<\/ul>\n<p>How is your organization approaching good security for the Internet of Things? Leave a comment below and let us know.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The more we talk about the Internet of Things (IoT) the more we have to talk about securing it. Gartner forecasts that by 2020, the IoT will comprise 26 billion devices and &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,566],"tags":[511,513,117,512,464,510,92,514],"coauthors":[],"class_list":["post-5855","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-scada-ics","tag-armando-decal","tag-arthur-capella","tag-gartner","tag-gavin-coulthard","tag-internet-of-things","tag-iot","tag-scada","tag-sharat-sinha"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5855"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5855\/revisions"}],"predecessor-version":[{"id":5856,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5855\/revisions\/5856"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5855"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}