Request Demo

Digital Risk Management

What The Winner Of CES' Highest Honor Says About The Future Of IoT

down-arrow

This week, technologists will gather in Las Vegas for what could be considered the hallmark event of the year for hardware: the Consumer Electronics Show (CES). CES can be best described as a glimpse into the future of the technology that touches our everyday lives: from in-car displays to virtual assistants to drones and (of course) the wealth of everyday objects that have been made “smart”. When we talk about smart objects, mirrors or trashcans, we’re referring to their induction into the internet of things. We’ve seen from experts that we could expect the next innovation in IoT technology to come in the form of better security. We saw it at the NIST Cybersecurity and Risk Management Conference, and apparently, CES agrees: the winner of their “Best in Innovation” award this year was none other than a security-based router. TrustBox by Scalys comes to the market just as many consumers welcome a host of new connected technologies into their homes following the holidays. We saw just before the end of the year, though, that oftentimes consumers are not aware of the necessary protocols to keep these devices from being harnessed by cybercriminals.

CyberSaint CEO, George Wrenn, has discussed the necessary role that device manufacturers need to have in developing stronger security protocols. Oftentimes it is a balance between user experience and security - while complex passwords and multifactor authentication are more secure, it can detract from a seamless user experience.

We expect to see more companies flaunt their security and privacy features at CES this year. Before the conference even began, Apple set up a billboard playing off of the iconic Las Vegas tagline: “What happens on your iPhone stays on your iPhone.” Comcast also announced a new Advanced Security feature for their Xfinity xFi service for an additional $5.99. With TrustBox taking home the Best in Innovation, we can expect security and privacy to take center stage for new devices.

What we’re seeing now, though, is how legacy IoT technologies that were rapidly developed in the name of securing market share are the devices in most need for greater security efforts. CyberSaint CEO, George Wrenn, has spoken about a device owners “right to patch”. In short, a device owner, whether on the enterprise IoT or an individual consumer, deserves to be secure regardless of when they purchased their technology.

What this means for device makers now is ensuring they have the ability to update the security and privacy technology on these devices as seamlessly as possible. As CES opens and we move into 2019, expect to see the convergence of user experience and security.

You may also like

Risk Register Examples for ...
on July 29, 2020

Risk registers are a widespread utility among many cybersecurity professionals that allow practitioners to track and measure risks in one place. This type of reporting can quickly ...

3 Templates for a Comprehensive ...
on July 27, 2020

What is a Cyber Risk Assessment Information security risk assessments are increasingly replacing checkbox compliance as the foundation for an effective cybersecurity program. As ...

Infographic: The Six Steps of the ...
on July 24, 2020

As many organizations begin to mature their cybersecurity program, they are shifting to a risk-based approach to security. In most cases, security leaders are no strangers to ...

3 Cybersecurity Risk Areas to ...
on July 20, 2020

2020 has brought with it immense change across the cybersecurity risk landscape. The effects of COVID-19 pandemic are still ongoing, and the opportunities for new cybersecurity ...

Alison Furneaux
Efficient Demotivation: How Black ...
on July 16, 2020

As information security shifts from a siloed function to an increasingly relied upon business function and enabler, business executives and Boards have taken a greater interest in ...

Developing Your Risk Management ...
on July 14, 2020

The scope and process for an organization seeking to implement the NIST Cybersecurity Framework (CSF) can be daunting for even the most experienced CISO to handle. Despite the ...