
IoT cybersecurity threats increasing in the energy cloud ecosystem
The report – “Managing IoT Cybersecurity Threats in the Energy Cloud Ecosystem” – looks at the cybersecurity threats related to the IoT and offers details on regulatory frameworks and basic strategies for secure IoT implementation.
“The mushrooming number of IoT devices being deployed by utilities and other enterprises carries an obvious and growing security risk,” says Neil Strother, principal research analyst with Navigant Research. “Smart managers need a comprehensive strategy to stay ahead of potentially devastating threats to IoT assets.”
“No longer can managers rely on an old-school reactive approach,” says Strother. “Instead, they and their security teams must adopt the latest proactive and predictive tools and methodologies to keep devices and systems safe.”
The urgency to proactively prevent threats has escalated quickly in the past few years, the report says, with corporate customers demanding robust security along value and supply chains. On the consumer side, there is a similar need to improve security for connected home devices and services.
The report looks at some of the regulatory frameworks shaping this market and considers the basic strategies that are considered necessary for a successful and secure IoT implementation, as well as the significant barriers hampering their implementation. It also offers practical steps that stakeholders should take to significantly reduce the ongoing risks they face from cyber attacks.
The report addresses several key questions:
- What are recent examples of cybersecurity threats to Internet of Things (IoT) deployments?
- What drivers are shaping the IoT cybersecurity market?
- What are some of the latest tools for thwarting cybersecurity attacks aimed at IoT projects?
- What are the common vulnerabilities and attack surfaces present in IoT settings?
- What is the global revenue forecast for IoT cybersecurity spending over the next decade?
- What strategies should be adopted for thwarting IoT cyber attacks?
An executive summary of the report is available as a free download on the firm’s site for registered users.
Related articles:
Hackers are targeting energy, critical infrastructure, warns U.S. gov
DOE forms new energy infrastructure cybersecurity office
Hardware-based cybersecurity startup raises funds to safeguard the IoT
Power grid ‘health’ monitoring needed for cybersecurity, say researchers
