top 10
2 TopicsInternet of Things OWASP Top 10
The Open Web Application Security Project (OWASP) is focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks and their OWASP Top 10 provides a list of the 10 Most Critical Security Risks. For each risk it provides a description, example vulnerabilities, example attacks, guidance on how to avoid and references to OWASP and other related resources. Many of you are familiar with their Top 10 Most Critical Web Application Security Risks. They provide the list for awareness and guidance on some of the critical web applications security areas to address. It is a great list and many security vendors point to it to show the types of attacks that can be mitigated. Now the Internet of Things (IoT) has its own OWASP Top 10. If you've lived under a rock for the past year, IoT or as I like to call it, the Internet of Nouns, is this era where everyday objects - refrigerators, toasters, thermostats, cars, sensors, etc - are connected to the internet and can send and receive data. There have been tons of articles covering IoT over the last 6 months or so, including some of my own. The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them. The OWASP Internet of Things Top 10 - 2014 is as follows: 1 Insecure Web Interface 2 Insufficient Authentication/Authorization 3 Insecure Network Services 4 Lack of Transport Encryption 5 Privacy Concerns 6 Insecure Cloud Interface 7 Insecure Mobile Interface 8 Insufficient Security Configurability 9 Insecure Software/Firmware 10 Poor Physical Security You can click on each to get a detailed view on the threat agents, attack vectors, security weaknesses, along with the technical and business impacts. They also list any privacy concerns along with example attack scenarios. Good stuff! ps Related: The Icebox Cometh The Applications of Our Lives Standards for 'Things' Securing the Internet of Things: is the web already breaking up? 4 things that will happen in the Internet of Things space in 2014 Tech's brightest unconvinced by internet of things OWASP Internet of Things Top 10 Technorati Tags: iot,things,owasp,security,top10,privacy,silva,f5,nouns Connect with Peter: Connect with F5:604Views0likes0CommentsThe Top 10, Top 10 Predictions for 2016
The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen. 7 Future Predictions for the Internet of Things – IoT is one of the hottest terms and trends. From connected cars, homes, businesses and more, connected devices are becoming more prevalent in our lives. Stable Kernel looks at the future economic growth, development of smart cities, wearables, privacy challenges and how voice commands will become the norm. Top 10 Humanoid Robots Designed To Match Human Capabilities And Emotions – While once a dream of The Jetsons, companion robots in the home will become as common as pets, even if the pet is a robot. WT VOX explores whether robots could fully replace humans by 2045 as some predict and takes a look at the top 10 that are starting to match human capability. The top security threats of 2016 – ZDNet digs into McAfee's 2016 cybersecurity threat report covering areas like hardware, ransomware, cloud services, connected cars and the warehouses of stolen data. From the Ashley Madison hack, to Jeeps taken off-road and the TalkTalk breach, digital infiltration is now a daily occurrence and no one is immune. Forrester’s top 10 predictions for business in 2016 — and what they mean for tech – Computerworld summarizes Forrester’s top 10 predictions and how 2016 will be the year that the companies that thrive will be those advancing down the customer obsession path. They look at critical business issues like loyalty, analytics, personalization and how privacy will become a value to which customers will respond. You need to live a customer-obsessed operating model to survive. IBM predicts tech world of 2016 – At number 5, IBM has published its 6th annual Five in Five - where it predicts five innovations that will change all of our lives in the next five years, with mind-reading machines apparently set to be interpreting our thoughts by 2016. From generating our own energy to no more passwords to almost everyone having some sort of mobile technology, IBM Labs is exploring these emerging technologies. DDoS Predictions for 2016, IBM Insights – Also from Big Blue, they are sharing insight into new types of DDoS attacks that are to be expected during the coming year. DDoS is no longer a nagging problem but a bona fide technique to disable a company’s resources. BitTorrent, malicious JavaScript and Temporal Lensing DDoS (pdf) attacks are all explained. As I’ve mentioned before, there have always been protesters and activists - some write letters, some picket on the sidewalk, some throw rocks and with the advent of the internet, now you can protest (and more) by creating digital havoc. 5 IT industry predictions for 2016 from Forrester and IDC – CIO.com hits on the 2016 predictions of IDC and Forrester, two of the largest analyst firms. In their distillation, there could be a bleak future for legacy vendors since according to IDC, ‘by 2020, more than 30 percent of the IT vendors will not exist as we know them today.’ There will also be some cloud consolidation, big data gets even bigger and traditional enterprises will turn into software companies. Software developers will become a scarce commodity. IDC Software Licensing and Pricing Predictions 2016: Top 10 Predictions – And speaking of software, Amy Konary of IDC writes about focus areas like the growth of subscription and outcomes-based pricing, the real cost of licensing complexity, usage models in IoT, the business model impacts of the convergence of cloud, mobile, social, and big data technologies. 10+1 Commandments For Companies Developing Wearable Health Trackers – Many of us will be getting a wearable or two this holiday season so ScienceRoll rolled up it’s 10+1 commandments every company developing wearable health trackers should follow. Practical value, online communities, long live batteries and gamification are what user’s desire. We know you want to make money but focus on helping people live a healthier life. In-depth: Top 10 Internet of Things companies to watch – We started with IoT and figured I’d caboose this with another. RCRWireless digs in to the top players in both Industrial IoT and Consumer IoT. Many of the names are familiar: Cisco, IBM, ATT, Google, GE, Samsung and a few others are already hedging their future on all these connected nouns. See what these organizations are doing both internally and externally to embrace IoT and take advantage of this proposed multi-trillion dollar market opportunity. And if you want to see if any of the previous year’s predictions came true, here ya go: The Top 10, Top 10 Predictions for 2015 The Top 10, Top 10 Predictions for 2014 The Top 10, Top 10 2013 Predictions The Top 10, Top Predictions for 2012 ps Technorati Tags: 2016,predictions,future,technology,security,cloud,iot,silva,wearables,f5,top10 Connect with Peter: Connect with F5:541Views0likes0Comments