WP_Term Object
    [term_id] => 87
    [name] => Intrinsic ID
    [slug] => intrinsic-id
    [term_group] => 0
    [term_taxonomy_id] => 87
    [taxonomy] => category
    [description] => 
    [parent] => 14433
    [count] => 5
    [filter] => raw
    [cat_ID] => 87
    [category_count] => 5
    [category_description] => 
    [cat_name] => Intrinsic ID
    [category_nicename] => intrinsic-id
    [category_parent] => 14433
    [is_post] => 1

IoT Devices Can Kill and What Chip Makers Need to Do Now

IoT Devices Can Kill and What Chip Makers Need to Do Now
by Daniel Nenni on 01-07-2019 at 12:00 pm

After the onslaught of IoT devices Christmas brought to the masses we really need to talk about security or lack thereof. Do me a favor and count how many IoT devices you have now? Our house IoT count is probably a bit higher than average due to my technology addiction but we are firmly in the double digits and the security breach stories just keep on coming.

Ransomware attacks are increasing, I actually know people who have been attacked and had to pay to get their information back with no guarantee that copies were not made or it won’t happen again. Doorbell cams, baby monitors, smart thermostats, fitness trackers, and even alarm systems can all be used to get into your home. Home WiFi routers, once the most vulnerable devices, are now considered quite secure compared to the others, absolutely.

If you really like scary bedtime stories read the 2018 Internet Health Report: Our compilation of research explains what’s helping and what’s hurting the Internet across five issues, from personal experience to global concerns.

Politicians are even concerned. California is now the first state to pass an IoT specific cybersecurity law with more to follow:

This bill, beginning on January 1, 2020, would require a manufacturer of a connected device, as those terms are defined, to equip the device with a reasonable security feature or features that are appropriate to the nature and function of the device, appropriate to the information it may collect, contain, or transmit, and designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure, as specified.

Not a lot of teeth here but a decent start, my opinion. We track both IoT and Security traffic on SemiWiki and it really is startling to see how much more traffic one gets over the other, which brings us to the topic at hand, an IoT security webinar that you will not want to miss:

IoT Devices Can Kill and What Chip Makers Need to Do Now
IoT devices are at growing risk – smart home appliances, vehicles and medical devices are hacked every day. Connected products are vulnerable to physical probing, network interception, reverse engineering and other attack vectors. As hackers become more clever, security solutions must be a few steps ahead. Robust remediation starts with unclonable identities for the MCU and connectivity chip at the core of an IoT product. Traditional security implementations are burdened with additional components, increased complexity, greater costs and longer time to market. By contrast, Intrinsic ID’s SRAM PUF solutions deliver a hardware root of trust with stronger security at a more attractive ROI. During our webinar we will cover: – Why a Root of Trust is critical for securing connected devices – How Intrinsic ID’s patented SRAM PUF powers vital use cases such as key management and device authentication – How SRAM PUF protects against cloning, counterfeiting and IP theft Register today to discover how SRAM PUF delivers the security that today’s IoT demands.


Presenters: Roel Maes: Senior Security Architect, Intrinsic ID Alpesh Saraiya: Senior Director Product Management, Intrinsic ID

About Intrinsic ID
Intrinsic ID is the world’s leading digital authentication company, providing the Internet of Things with hardware-based root-of-trust security via unclonable identities for any IoT-connected device. Based on Intrinsic ID’s patentedSRAM PUF technology, the company’s security solutions can be implemented in hardware or software. Intrinsic ID security, which can be deployed at any stage of a product’s lifecycle, is used to validate payment systems, secure connectivity, authenticate sensors, and protect sensitive government and military systems. Intrinsic ID technology has been deployed in more than 100 million devices. Award recognition includes the Frost & Sullivan Technology Leadership Award and the EU Innovation Radar Prize. Intrinsic ID security has been proven in millions of devices certified by Common Criteria, EMVCo, Visa and multiple governments. Intrinsic ID’s mission: “Authenticate Everything.” Visit Intrinsic ID online atwww.Intrinsic-ID.com.

I hope to see you there.

Also read:

Intrinsic ID’s BroadKey Named ‘IoT Security Product of the Year’ in 2019 IoT Breakthrough Awards