Intrinsic ID at Frost & Sullivan Awards Gala – 24 January 2018

Way to go Intrinsic ID team!

Frost & Sullivan Recognizes Intrinsic ID with Technology Leadership Award for IoT Security

Noted for technology utilizing unique, unclonable device identities

SUNNYVALE, Calif. – Oct. 23, 2017 – Intrinsic ID®, the  world’s leading provider of digital authentication technology for Internet of Things security and embedded applications, today announced it has been recognized with the 2017 Frost & Sullivan Technology Leadership Award for Device-Level Digital Authentication Technology for IoT. The recognition stems from Frost & Sullivan’s ongoing analysis of the growth in the Internet of Things market, and the accompanying expectation that digital security companies that can provide device-level digital authentication technology for IoT devices are expected to secure leadership positions in IoT security.

Continue reading

When IoT Attacks – The End of the World as We Know It?

Excerpts of my interview with Phil Muncaster @philmuncaster

InfoSecurity Magazine Q4/2017, 4 October 2017

https://www.infosecurity-magazine.com/digital-editions/digital-edition-q4-2017/

Focus on the Firmware

A cursory look at OWASP’s IoT Security Guidance will highlight just how many elements in the IoT ecosystem could be exploited. Among others, these include the web interface, network, transport encryption layer, mobile app and device firmware. The latter is a key area of focus for the prpl Foundation, a non-profit which is trying to coral the industry into taking a new hardware-based approach to IoT security. Cesare Garlati, Chief Security Strategist, claims that hackers could exploit IoT chip firmware to re-flash the image, allowing them to reboot and execute arbitrary code.

Continue reading

RSA Conference 2016 – A New Hardware-Based Approach to Secure the Internet of Things

Live Demo: A New Hardware-Based Approach to Secure the Internet of Things
RSA Conference 2016 – Abu Dhabi
November 16, 2016 | 11.20 – 12.10 hrs | Level 1 | Room: Etihad Ballroom 2

rsa-2016-garlati-clip

 

Quick look – This session will address four key elements that have introduced serious weaknesses into the IoT: proprietary systems, connectivity, unsigned firmware and lateral movement. Discussion will showcase a new approach to IoT security demonstrating how SoC virtualization and security through separation can address these vulnerabilities, which have already been shown to have potentially life-threatening consequences.

From hospitals dispensing life-saving drugs, to connected cars – embedded computing is transforming the way we live and work. But underlying weaknesses have introduced potentially life-threatening vulnerabilities into the Internet of Things.

Continue reading