Bookmark and Share

No Longer Left to Their Own Devices: Hacking Concerns with the Internet of Things

The group felt the cryptography and encryption were a help, but not a panacea. Some of the key points of discussion included basic and foundational strategy for using encryption is key, monitoring and management of keys, and cost. The possible push to outsource or an outsource model also came up. Managing the outsourcer and the governance of the outsourcer however still remains a critical issue.

Centralized management of keys and certificates are also key to securing your enterprise. If you build a bubble around a person’s PC and make it difficult for them to do things because of encryption, they’re going to find a way to work around it. Topics like different encryption types and key methods also came up along with the use of things like VPNS. What you encrypt is also a key point of interest when securing your data.