IoT Security
07.Oct.2021

Are CISOs fuzzing with IoT? We hope so.

Share:

We must crack the code to hidden security risks before adversaries hit home

– Eli Kirtman

Were we privy to the nefarious actor’s playbook, we would see that intruders and insider threats alike share a motif deeper than the enterprise’s bottom line — to compromise its unknown vulnerabilities — and they’re targeting the plethora of security risks in the Internet of Things (IoT) technology to get there.

All the while, the full suite of executives is zipping through security protocols, ransom insurance policies and vetting third-party solutions to protect their devices from the inevitable Zero-Day attack.

An attack that security leaders may not see coming, unless they’re fuzzing in the right places.
 

Fuzz where adversaries wield power.

Considered one of the most effective technical methods to discover unknown vulnerabilities, fuzz testing analyzes and learns how the device we’re creating responds to normal and abnormal conditions during the software development life cycle (SDLC) and, when we go deep enough, it detects risks with high precision.

Zooming into the CISO’s ideal playbook would reveal a stealth fuzz strategy to eliminate hidden security risks before bad guys even get a whiff; but we’re also likely to see red-inked question marks blotting the margins.

Descending the depths of the unknown can be a turbulent journey, depending on the enterprise’s unique challenges and resources. Those that successfully fuzz the code tend to execute tactful imperatives to get there, according to Onward Security’s CEO, Morgan Hung.
 

Imperative 1: Pre-map fuzz strategy to regulatory landscape

Adhering to so many technical and security protocols is a universal challenge for IoT manufacturers.
“Don’t give up!” encourages Hung. We’re not bound to every regulation orbiting the sphere. In addition to requirements that are unique to our product, he warns us to be mindful of criteria for devices that are subjected to hybrid network environments and international deployments where risks are more diverse and have a wider impact. 
 

Imperative 2: Execute security design principles deep, everywhere

Leverage fuzz architecture and precise positioning technology that enables us to implement security design principles at every stage in the life cycle and throughout the layers of computer network architecture.

This tactic allows CISOs to maintain the integrity of cybersecurity testing and controls while rendering test results with near-zero misjudgment, according to Jacky Lee, product development director at Onward Security.  
 

Imperative 3: Top that off with automated tools, continuously

Implement automated testing and detection capabilities to ensure the reliability and integrity of data. At the bare minimum, automating security vulnerability scans on a continuous basis is a must in order to safely deliver during truncated software update and upgrade cycles. 
 

Imperative 4: Decipher the fuzz, comprehensively 

Operationalize an integrated and easy-to-use interface to make sense of the vast volume of information. 
Adopting these tactful imperatives can help security leaders fuzz-out numerous other setbacks, ultimately streamlining the product to market. 
 

Take it home, safely

The Internet of Things is an inescapable and regular beat in our lives. This is especially true for people who depend on connected medical and assisted living technologies.

“Similar to a doctor checking the condition of our heart and other vital organs, we must know that our devices are healthy and safe,” implores Hung.

It is imperative that we crack the code on hidden security risks before bad actors hit home.

Onward Archives
– Eli Kirtman is a freelance writer based in Cincinnati, Ohio.
Are CISOs Fuzzing With IoT? We Hope So.

Sponsored by Onward Security

Onward Security is a leading brand in cybersecurity compliance solutions for the Internet of Things. It has been selected as Best Cybersecurity Company – Asia Gold Winner by Cyber Security Excellence Awards. In addition to possessing an international IoT cybersecurity testing lab, it develops automated security assessment products with AI and machine learning features. It has been dedicating to helping customers in IoT/IIoT equipment manufacturing, finance, telecom, and other industries for fast obtaining security certification and effectively managing risks and vulnerabilities of open source software to ensure cyber and product security.
 

In the News

Inquiry

Contact Us
Thank you for visiting us. Please leave your contact information, and we will reply you as soon as we can.
  • Onward Security is committed to your privacy. Your information won't be shared with third parties and is used to contact you about relevant content. You may unsubscribe at any time. For more info, please read our Privacy Policy. By clicking below submit button, you consent to allow Onward Security to store and process the personal information submitted above to provide you the content requested.

Why Onward Security

In-depth Cybersecurity Techniques+

  • Uncovered 40+ zero-day vulnerabilities (CVE)
  • Discovered 3000+ IoT product vulnerabilities

Dedicated to IoT Product Security+

  • 150+ cybersecurity projects in IoT industry
  • Tested 700+ IoT product security

Global Compliance and Certification Capability+

  • 300+ customers / 10+ countries certification obtained
  • Compliance experience in IIoT, medical, automotive, BFSI, and consumer IoT industry
Subscribe to Newsletter:

Verification

Click the numbers in sequence.

WeChat
This site uses cookies to improve your experience and to provide content customized specifically to your interests. By continuing to browse our site without changing your cookie settings (click the Privacy Policy button for more info), or by clicking the Continue button, you hereby acknowledge and agree to our privacy policy and use of cookies.