Outsmarting IoT Defense: The Hacker’s Perspective
Endless patching is a race that cannot be won. To build sustainable, secure IoT solutions we must change that ineffective paradigm. To appreciate what we can do differently, we should start by considering both the defender’s and attacker’s perspectives.
The Embedded Open Source Summit, which will take place on June 27-30, 2023 in Prague, Czech Republic, as well as virtually starting on June 26, will provide a unique view of that attacker’s perspective, from former exploit/attack experts within the IDF Unit 8200.
One of the sessions will demonstrate the inadequacies of current IoT security practices focused on continuous patching, static analysis, encryption, and risk controls. It will also explain how attackers can easily evade such barriers. By contrast, the session will explore methods for achieving embedded, on-device runtime exploits protection to immunize devices from all underlying vulnerabilities, and provide zero-day protection as well. These methods, commonplace in IT endpoint detection and response, are just now finding their way into heretofore unprotected and unmanaged IoT edge devices.
The Embedded Open Source Summit, which will take place on June 27-30, 2023 in Prague, Czech Republic, as well as virtually starting on June 26, will provide a unique view of that attacker’s perspective, from former exploit/attack experts within the IDF Unit 8200.
One of the sessions will demonstrate the inadequacies of current IoT security practices focused on continuous patching, static analysis, encryption, and risk controls. It will also explain how attackers can easily evade such barriers. By contrast, the session will explore methods for achieving embedded, on-device runtime exploits protection to immunize devices from all underlying vulnerabilities, and provide zero-day protection as well. These methods, commonplace in IT endpoint detection and response, are just now finding their way into heretofore unprotected and unmanaged IoT edge devices.
No comments: