Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Enterprises Are Leaving IoT Devices Vulnerable to Cybersecurity Threats, Finds nCipher Security

New Report from Ponemon Institute Reveals IoT as Fastest-Growing Driver for PKI, but Lack of Security Best Practices Is Leaving Them Unprepared

IoT is one of the fastest growing trends in technology, yet enterprises are leaving themselves vulnerable to dangerous cyberattacks by failing to prioritize PKI security, according to new research from nCipher Security, an Entrust Datacard company.

Enterprises leaving #IoT vulnerable to cybersecurity threats, finds 2019 @nCipherSecurity study

The 2019 Global PKI and IoT Trends Study, conducted by research firm the Ponemon Institute and sponsored by nCipher Security, is based on feedback from more than 1,800 IT security practitioners in 14 countries/regions. The study found that IoT is the fastest-growing trend driving public key infrastructure (PKI) application deployment – with 20% growth over the past five years.

Respondents cited concerns about several IoT security threats, including altering the function of IoT devices through malware or other attacks (68%) and remote control of a device by an unauthorized user (54%). However, respondents rated delivering patches and updates to IoT devices, the capability that protects against that top threat, last on a list of the five most important IoT security capabilities.

The study also found that in the next two years an average of 42% of IoT devices will rely primarily on digital certificates for identification and authentication. But encryption for IoT devices, and for IoT platforms and IoT data repositories, is at just 28% and 25% respectively, according to nCipher’s 2019 Global Encryption Trends Study.

Read More: Rev.com Selected for Inaugural Forbes Artificial Intelligence 50 List

“The scale of IoT vulnerability is staggering – IDC recently forecasted that there will be 41.6B connected IoT devices by 2025, generating 79.4 zettabytes of data,” said John Grimm, senior director of strategy and business development at nCipher Security. “There is no point in collecting and analyzing IoT-generated data, and making business decisions based upon it, if we cannot trust the security of devices or their data. Building trust starts with prioritizing security practices that counter the top IoT threats, and ensuring authenticity and integrity throughout the IoT ecosystem.”

PKI plays a strategic role, but organizations are leaving themselves vulnerable and unprepared

PKI is at the core of the IT infrastructure for many organizations, enabling security for critical digital initiatives such as cloud, mobile device deployment, and IoT.

Most respondents use PKI extensively in their organizations, for SSL/TLS certificates (79%), private networks and VPNs (69%), and public cloud-based applications and services (55%). Yet more than half (56%) believe PKI is incapable of supporting new applications. In addition, many respondents see significant technical and organizational barriers to PKI usage, including an inability to change legacy applications (46%), insufficient skills (45%) and resources (38%).

Related Posts
1 of 40,660
Enterprise PKI security best practices a mixed bag

Nearly a third (30%) of organizations – an especially jarring share considering the implications – are not using any certificate revocation techniques. More than two-thirds (68%) cite “no clear ownership” as their top PKI challenge.

But, some enterprises are applying more rigor to PKI security in certain areas. The share of respondents using “password only” for Certificate Authority administrators has dropped 6% from 2018 to 24% this year. And 42% of respondents said that they are using hardware security modules (HSMs) to manage private keys.

Read More: GMEX Taps IBM Blockchain to Support Digital Assets

Other key findings from the report:

  • HSM use as an IoT root of trust jumped significantly over 2018 (from 10% to 22%).
  • Despite a growing number of options for PKI deployment (cloud, managed and hosted), internal corporate Certificate Authorities (CAs) remain the most popular and have grown 19% over the past five years to 63% – with 80% of financial services organizations favoring this option.
  • Forty-four percent of respondents believe PKI deployments for IoT devices will consist of a combination of cloud-based and enterprise-based implementations.
  • The most important PKI capabilities for IoT in 2019 are scalability to millions of certificates (46%) and online certificate revocation (37%).

“PKI use is evolving as organizations address digital transformation across their enterprises. In addition to IoT, more than 40% of our respondents also cited cloud and mobile initiatives as driving PKI use,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “Clearly, the rapid growth of the IoT is having a huge impact on the use of PKI, as organizations realize that PKI provides core authentication technology for connected devices. For organizations to gain full advantage of their digital initiatives, they must continue to improve the security maturity of their PKIs.”

Download your copy of the new 2019 Global PKI and IoT Trends Study.

2019 Global PKI and IoT Trends Study methodology

The 2019 Global PKI and IoT Trends Study captures the current state of PKI maturity, PKI challenges and the influence of the IoT on PKI trends. The report summarizes the fifth annual results of a survey completed by 1,884 IT security practitioners in the following 14 countries/regions: Australia, Brazil, France, Germany, Hong Kong and Taiwan, India, Japan, Mexico, the Middle East (Saudi Arabia and the United Arab Emirates), the Russian Federation, South Korea, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), the United Kingdom, and the United States.

Read More: Chocolate Not Drugs the Future of Bitcoin Commerce

49 Comments
  1. Have you ever thought about creating an e-book or guest authoring on other sites?
    I have a blog based on the same information you discuss
    and would love to have you share some stories/information. I know
    my audience would appreciate your work. If you’re even remotely interested,
    feel free to send me an e-mail.

  2. I do not even know how I ended up here, but I thought this post was great.
    I don’t know who you are but certainly you’re going
    to a famous blogger if you are not already 😉 Cheers!

  3. Your style is unique compared to other people I have read
    stuff from. I appreciate you for posting when you’ve got
    the opportunity, Guess I’ll just bookmark this site.

  4. whoah this weblog is excellent i really like reading
    your articles. Keep up the great work! You recognize, a lot of people
    are looking round for this info, you can help them greatly.

  5. tlover tonet says

    Hello, i think that i saw you visited my blog thus i came to “return the favor”.I am trying to find things to improve my website!I suppose its ok to use some of your ideas!!

  6. mlbstreams says

    Very interesting topic, appreciate it for putting up.

  7. Recycled copper products says

    Copper scrap recycling solutions Copper scrap disposal Metal byproduct utilization
    Copper cable reprocessing, Scrap metal management, Scrap Copper prices

  8. Sustainable metal recovery Ferrous waste transportation Iron scrap refining

    Ferrous material stakeholder involvement, Iron reuse facility, Metal waste pricing

  9. Really Appreciate this article, is there any way I can receive an alert email every time you make a fresh post?

  10. I’ll right away grab your rss as I can not find your email subscription hyperlink or e-newsletter service. Do you have any? Kindly allow me know in order that I may subscribe. Thanks.

  11. pintura de cara alpino says

    Hiya, I’m really glad I’ve found this information. Nowadays bloggers publish just about gossips and net and this is really frustrating. A good site with interesting content, this is what I need. Thanks for keeping this website, I’ll be visiting it. Do you do newsletters? Can’t find it.

  12. hire a hacker for whatsapp says

    Appreciate it for helping out, excellent info. “The four stages of man are infancy, childhood, adolescence, and obsolescence.” by Bruce Barton.

  13. hire a hacker for iPhone says

    I have recently started a blog, the info you provide on this website has helped me greatly. Thank you for all of your time & work. “The word ‘genius’ isn’t applicable in football. A genius is a guy like Norman Einstein.” by Joe Theismann.

  14. Pro nail complex says

    Some genuinely great content on this website, appreciate it for contribution. “An alcoholic is someone you don’t like who drinks as much as you do.” by Dylan Thomas.

  15. Sumatra Slim Belly Tonic says

    Wow, incredible blog layout! How long have you been blogging for? you make blogging look easy. The overall look of your website is wonderful, let alone the content!

  16. Leanbiome review says

    I got good info from your blog

  17. Fitspresso review says

    Saved as a favorite, I really like your blog!

  18. Java Burn says

    The next time I read a blog, I hope that it doesnt disappoint me as much as this one. I mean, I know it was my choice to read, but I actually thought youd have something interesting to say. All I hear is a bunch of whining about something that you could fix if you werent too busy looking for attention.

  19. Zencortex says

    There is obviously a bunch to know about this. I assume you made various nice points in features also.

  20. Keep on working, great job!

  21. prostadine review says

    Hello. magnificent job. I did not anticipate this. This is a splendid story. Thanks!

  22. Pronerve 6 says

    Very interesting details you have noted, regards for putting up.

  23. lottery defeater software says

    What is Lottery Defeater Software? Lottery Defeater Software is a plug-and-play Lottery Winning Software that is fully automated. Kenneth created the Lottery Defeater software. Every time someone plays the lottery, it increases their odds of winning by around 98.

  24. Points de vente autorisés de médicaments en France Cevallos Cesano Maderno waar medicijnen kopen

  25. Obtenez votre médicaments en ligne rapidement et facilement
    SMB San Juan Girón médicaments disponible en ligne avec livraison rapide en Belgique

  26. acheter lisinogen en france says

    peut-on obtenir du médicaments sans ordonnance Viofar Montaigu-Zichem (Scherpenheuvel-Zichem) Medikamente zu wettbewerbsfähigem Preis

  27. самый большой метеорит который упал на землю, самый
    большой метеоритный кратер заговор чтоб его разлюбить снится мыть полы
    во сне руками
    кармические отношения тест онлайн,
    как рассчитать кармические отношения смотреть аниме хроники акаши худший
    учитель магии

  28. кровь в соннике ванги как проявляют себя
    планеты в гороскопе как избавиться от сглаза соседей
    как снять проклятие мир магии симс
    4 карты для гадание заказать

  29. farmaci a prezzo accessibile a Torino Tarbis Cabo San Lucas Medikamentenpreis in Marokko

  30. кураган гул скачать, кураган гул
    скачать 2 құлагерді бейнелеу, құлагер сипаттамасы күлтегін жыры мәлімет, күлтегін
    жыры қысқаша мазмұны парус алаколь,
    база отдыха парус отзывы

  31. Preis für verschreibungspflichtige Medikamente Stada Lenzburg médicaments disponible en ligne avec livraison rapide en Belgique

  32. ғылым дегенді қалай түсінесіз,
    ғылым адамға не береді қыс мезгілінің ерекшеліктері, қыс мезгілі шығарма 2 сынып
    гана чм-2022, испания заявка на чм-2022 курс рубля к тенге сбербанк семей, курс рубля на сегодня

  33. неліктен сіз бейтаныс адамдардың келуін армандайсыз
    тауар таңбалары, тауар таңбаларын
    қалай белгілейді әбу есімінің мағынасы, мұхаммед әли есімінің мағынасы оңтүстік корея экономикасы, оңтүстік корея экологиясы

  34. médicaments à commander sans ordonnance Combix Carate Brianza medicijnen online kopen: snel en makkelijk

  35. кітап сату жолдары ойын арқылы ашық сабақ балабақшада,
    теңге алу ойыны балабақшада найзағай суреті,
    көшпелі найзағай арал теңізі алабына кіретін өзен дер, арал теңізі 2022

  36. мәдени мұра мемлекеттік бағдарламасы
    рәміздер туралы тақпақтар, әнұран туралы тақпақтар рустамбек бегметов
    контакты, рустам ака манкент отзывы как узнать номер кск
    по адресу, как узнать кск по адресу усть-каменогорск

  37. скачать музыку сени суйем қайрат
    нұртас, сені сүйем қайрат нұртас скачать
    текст алма адамға пайдасы, алмұрттың пайдасы мұхит суларының қасиеттері, мұхит суларының басты қасиеттері сөз таптарына сатылай кешенді талдау, қажымұқан сатылай кешенді талдау

  38. сушильная машина для белья отзывы, сушильные машины қала типтері, қазақстандағы елді мекен атаулары макдональдс
    казахстан владелец, макдональдс в казахстане новости что лучше сустанон или нандролон, нандролон курс

  39. стихи абая на казахском легкие, стихи абая кунанбаева на казахском языке про осень how to turn on nfc
    on samsung a21s, samsung a21s цена лучшие песни принца скачать, асха
    принц суета скачать доминантты тіркес
    тұқым қуалау, цитоплазмалық тұқым қуалау

  40. бәйгеге ат дайындау, ат баптау кокпар ejebs, eurasian journal of business and
    management қыс туралы өлең балабақша, қыс туралы тақпақ 4 сынып кызыл раушан музыка,
    кызыл раушан скачать ремикс

  41. к чему снится сон женщина целуется с женщиной
    к чему снится травяной чай молитва чтобы не забрали парня в армию
    если снится есть сырое мясо что это значит к чему снились вареные раки

  42. бесик польза и вред, бесик отзывы
    көшбасшылық мәселесіне
    жаңа көзқарастар, тиімді көшбасшылық
    критерийлері колонка маруся купить
    со скидкой, smart колонка баурап алатын дидарын кандай музарт лайф, баурап алатын дидарын кандай slowed скачать

  43. подработка иваново листовки самостоятельная работа логарифмические уравнения дистанционное обучение график работы мфц на ленинградском шоссе
    дом 108 подработка уборщицей саратов ленинский район

  44. букет белых цветов снится к чему снится поймать змею руками, ловить змей во сне как выдать пилюлю в айзеке, чит-коды на айзека repentance
    беременной снится рыба в магазине молитвы св виктору

  45. кровля домов работа сколько стоит подработка официантом
    контент менеджер вакансии удаленно
    без опыта удаленно найти подработку ангарск

  46. импульстің сақталу заңы мысалдар, импульстің сақталу заңы презентация политическая система англии в
    18 веке, принцип разделения
    властей в англии ауыр қаруланған рим жауынгері,
    темір өңдеу орталығы қазақстан тұрақты
    80 кпа қысымда идеал газ 640 дж, микробөлшектер әлемінде заттың бірлік

  47. médicaments en vente en ligne en France Liferpal Pfäffikon wskazanie leków na
    sprzedaż w Polsce

  48. ¿Cómo obtener medicamentos en México? Schering Sartrouville prix du médicaments
    au Maroc

  49. махамбет өтемісұлы атындағы
    университет факультеты, зкгу стоимость обучения 2022 мейірімді қала тұрғындары, қайырымды қала тұрғындары кітабы школа им островского,
    сши 4 кешегі күн өмір емес тарих
    қай тарау, бүгінгі күн ертеңгі тарих на
    русском

Leave A Reply

Your email address will not be published.