New Technologies Secure the IoT & IIoT
Cybercriminals are constantly discovering new ways to exploit the growing Internet of Things IoT and Industrial Internet of Things IIoT. See also Cyber Insecurity.
Traditional cybersecurity solutions rely on techniques like signatures and repeated updates, which means they are difficult to integrate and they cannot secure IoT systems and devices effectively. For example, conventional solutions simply cannot cope with zero-day or zero-hour attacks. A zero day/hour vulnerability refers to a security hole in software that is unknown to the vendor and that can be exploited by hackers before the vendor becomes aware of it.In order to address these issues, Webroot has introduced its IoT Security Toolkit — a set of technologies that enables IoT solution designers and integrators to leverage cloud-based, real-time threat intelligence services from Webroot to protect deployed systems against cyberattacks.The Webroot IoT Security Toolkit is powered by the Webroot BrightCloud Threat Intelligence Platform, a collective threat intelligence architecture that classifies and shares cybersecurity intelligence from millions of devices and sensors, and billions of Internet threats emanating from IPs, URLs, files, and mobile applications. The key point to note here is that an Internet location that is “known good” at any particular time may become corrupted and subverted only moments later. Leveraging a massive Hadoop distributed cloud computing architecture, the BrightCloud Threat Intelligence Platform scans and classifies the entire Internet universe multiple times a day in order to detect the latest cyber threats.