RSA Conference has always been committed to providing opportunities for the next generation of cybersecurity innovators. So for , we are excited to announce RSAC Early Stage Expo , a new space on the RSAC campus where attendees could meet with 40 emerging startups and discover new solutions from up-and-coming companies.
Our panel of venture capitalists, entrepreneurs and large security companies selected UnifyID from a group of 10 finalists as the winner. Past winners include Sourcefire, Imperva and most recently Phantom. If you missed us in San Francisco, you can find us again all over the globe:. Content produced by our editorial team is never influenced by advertisers or sponsors in any way. For more information, contact sales venturebeat. That said, there is some fearmongering around IoT.
To me, that sends a message that all IoT devices are vulnerable most if not all of the time. The assumption is that these devices are connected to the internet or otherwise easily accessible and are therefore easily exploited. Sure, the onslaught of IoT devices can introduce new risks, but every situation is unique. With cloud-centric artificial intelligence and big data analytics claiming to solve our current challenges associated with logging, alerting and responding, perhaps these emerging solutions will inch us toward getting a better grip on this area.
Those attacks, generating peak traffic of 1TByte or more, raise the question of how best to secure these devices, and sessions at the Feb. The offensive potential is great for compromised IoT devices such as home routers and surveillance cameras because they can readily be hijacked into bot armies that launch these high-volume attacks. The onslaughts are difficult to stem because they come from a wide range IP addresses broadly distributed around the globe. Akamai, one of the service providers that helped mitigate the first of the large IoT DDoS attacks linked to Mirai malware, is sending Or Katz, one of its researchers to the conference to send a warning.
Attackers can extort money from potential victims by threatening DDoS attacks and demanding payment to call them off. Or they might use the attacks to exact revenge against companies for perceived wrongdoing.
Using data that IoT devices gather as legal evidence poses its own set of problems, which include preserving the data and its integrity, and analyzing it for incident investigations and to present as evidence in court. Security luminary Bruce Schneier will offer up two sessions about regulating IoT devices, which are woefully insecure, some say because they are not held to any set of security standards.
Ransomware — another hot topic at the conference — can be used to lock up IoT devices to cause harm, and its use is projected to continue this year.
0コメント