Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Enterprises Are Leaving IoT Devices Vulnerable to Cybersecurity Threats, Finds nCipher Security

New Report from Ponemon Institute Reveals IoT as Fastest-Growing Driver for PKI, but Lack of Security Best Practices Is Leaving Them Unprepared

IoT is one of the fastest growing trends in technology, yet enterprises are leaving themselves vulnerable to dangerous cyberattacks by failing to prioritize PKI security, according to new research from nCipher Security, an Entrust Datacard company.

Enterprises leaving #IoT vulnerable to cybersecurity threats, finds 2019 @nCipherSecurity study

The 2019 Global PKI and IoT Trends Study, conducted by research firm the Ponemon Institute and sponsored by nCipher Security, is based on feedback from more than 1,800 IT security practitioners in 14 countries/regions. The study found that IoT is the fastest-growing trend driving public key infrastructure (PKI) application deployment – with 20% growth over the past five years.

Respondents cited concerns about several IoT security threats, including altering the function of IoT devices through malware or other attacks (68%) and remote control of a device by an unauthorized user (54%). However, respondents rated delivering patches and updates to IoT devices, the capability that protects against that top threat, last on a list of the five most important IoT security capabilities.

The study also found that in the next two years an average of 42% of IoT devices will rely primarily on digital certificates for identification and authentication. But encryption for IoT devices, and for IoT platforms and IoT data repositories, is at just 28% and 25% respectively, according to nCipher’s 2019 Global Encryption Trends Study.

Read More: Selected for Inaugural Forbes Artificial Intelligence 50 List

“The scale of IoT vulnerability is staggering – IDC recently forecasted that there will be 41.6B connected IoT devices by 2025, generating 79.4 zettabytes of data,” said John Grimm, senior director of strategy and business development at nCipher Security. “There is no point in collecting and analyzing IoT-generated data, and making business decisions based upon it, if we cannot trust the security of devices or their data. Building trust starts with prioritizing security practices that counter the top IoT threats, and ensuring authenticity and integrity throughout the IoT ecosystem.”

PKI plays a strategic role, but organizations are leaving themselves vulnerable and unprepared

PKI is at the core of the IT infrastructure for many organizations, enabling security for critical digital initiatives such as cloud, mobile device deployment, and IoT.

Most respondents use PKI extensively in their organizations, for SSL/TLS certificates (79%), private networks and VPNs (69%), and public cloud-based applications and services (55%). Yet more than half (56%) believe PKI is incapable of supporting new applications. In addition, many respondents see significant technical and organizational barriers to PKI usage, including an inability to change legacy applications (46%), insufficient skills (45%) and resources (38%).

Related Posts
1 of 20,680
Enterprise PKI security best practices a mixed bag

Nearly a third (30%) of organizations – an especially jarring share considering the implications – are not using any certificate revocation techniques. More than two-thirds (68%) cite “no clear ownership” as their top PKI challenge.

But, some enterprises are applying more rigor to PKI security in certain areas. The share of respondents using “password only” for Certificate Authority administrators has dropped 6% from 2018 to 24% this year. And 42% of respondents said that they are using hardware security modules (HSMs) to manage private keys.

Read More: GMEX Taps IBM Blockchain to Support Digital Assets

Other key findings from the report:

  • HSM use as an IoT root of trust jumped significantly over 2018 (from 10% to 22%).
  • Despite a growing number of options for PKI deployment (cloud, managed and hosted), internal corporate Certificate Authorities (CAs) remain the most popular and have grown 19% over the past five years to 63% – with 80% of financial services organizations favoring this option.
  • Forty-four percent of respondents believe PKI deployments for IoT devices will consist of a combination of cloud-based and enterprise-based implementations.
  • The most important PKI capabilities for IoT in 2019 are scalability to millions of certificates (46%) and online certificate revocation (37%).

“PKI use is evolving as organizations address digital transformation across their enterprises. In addition to IoT, more than 40% of our respondents also cited cloud and mobile initiatives as driving PKI use,” said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute. “Clearly, the rapid growth of the IoT is having a huge impact on the use of PKI, as organizations realize that PKI provides core authentication technology for connected devices. For organizations to gain full advantage of their digital initiatives, they must continue to improve the security maturity of their PKIs.”

Download your copy of the new 2019 Global PKI and IoT Trends Study.

2019 Global PKI and IoT Trends Study methodology

The 2019 Global PKI and IoT Trends Study captures the current state of PKI maturity, PKI challenges and the influence of the IoT on PKI trends. The report summarizes the fifth annual results of a survey completed by 1,884 IT security practitioners in the following 14 countries/regions: Australia, Brazil, France, Germany, Hong Kong and Taiwan, India, Japan, Mexico, the Middle East (Saudi Arabia and the United Arab Emirates), the Russian Federation, South Korea, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), the United Kingdom, and the United States.

Read More: Chocolate Not Drugs the Future of Bitcoin Commerce

  1. […] Read More: Enterprises Are Leaving IoT Devices Vulnerable to Cybersecurity Threats, Finds nCipher Security […]

  2. […] Read More: Enterprises Are Leaving IoT Devices Vulnerable to Cybersecurity Threats, Finds nCipher Security […]

  3. Charleshag says

    herd book charolais palmares du concours de la chatre 2017 Avengers End Game Highlights 1080p Gratuitement tama gambosi space science book

  4. Slot It Scp201m Mode D Emploi Casino Arras Histoire Super Marche Casino Vallauris 06

Leave A Reply

Your email address will not be published.