• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

10 Cyber Security Stars Working to Secure IoT

HP and Wired have collaborated to bring the stories of ten cyber security re-inventors that are working to keep the world secure as Internet of Things becomes more and more mainstream.

March 5, 2017 TechDecisions Staff 1 Comment

The Internet of Things (IoT) is going to open the world up to many possibilities. Opening up, however, also invites harm.

It’s no secret that security is a main point of concern around IoT. A lack of standards, uncertainty within the industry about best practices, and consumer ignorance to what security features products should have are very real concerns.

We’ve reached a point of dueling ideologies – IoT advocates that tell us how much easier it will make our lives and IoT security experts that warn of how detrimental IoT can become if not properly secured.

The certainty is that IoT will open up many new portals to the network. The logic that follows is that more entry points equates to more possibilities for intruders. No one denies that IoT can change everything, but at what cost?

Some are trying to minimize the possible cost already. A joint venture of HP and Wired has produced the story of ten individuals that are working to ensure that IoT doesn’t become a playground for hackers.

  • Mischa Dohler, Professor in Wireless Communications, King’s College London – Dohler predicted that vulnerabilities of unchecked IoT devices would result in a rise in DDoS attacks, like the one on domain name system service provider DYN.
  • Ovidiu Vermesan, Co-ordinator, IoT European Research Cluster (IERC) – Vermesan’s role is to facilitate research on IoT deployment in development, such as uses for National Grid, city lighting, self-regulating buildings and more.
  • Samu Konttinen, Executive Vice President, Consumer Security, F-Secure – With F-Secure, Konttinen is bringing security to the router. F-Secure scans the network on behalf of all connected devices and runs another level of security checks from the cloud, allowing clients to query connections before accepting them.
  • Carlos Moreira, Founder and CEO, WISeKey – WISeKey’s Root of Trust incorporates hardware into the chip of IoT devices to provide a cryptographic signature of authenticity and integrity to an AI cloud-based security platform. This keeps the network safe from each device and potential malicious connections.
  • Patricia Lewis, Research Director, International Security, Chatham House – Lewis is concerned with the cyber security of satellites. They control everything from navigation to financial services and defense. In fact, cyberattacks like jamming GPS signals have been carried out as early as 2012.
  • Boris Danev, Founder and CEO, 3DB Technologies – Through 3DB Technologies, Danev has created a chip that prevents attacks wherein a hacker can use a Bluetooth amplifier to trick a car with keyless entry systems into starting.
  • Neil Costigan, CEO, BehavioSec – Costigan’s company is working to create a password system in which unique behavioral interaction patterns like the way you touch your phone, move your mouse, or type can be used as a password.
  • Sebastian Marcel, Senior Research Scientist, Idiap Research – Marcel’s research surrounds figuring out ways to security systems can be fooled. He leads a Biometrics group to research multiple authentication modalities, how biometric identifiers can be tricked, and how to prevent these tricks from working.
  • Dudu Mimran, CTO, Telekom Innovation Laboratories, Ben Gurion University – Mimran focuses on the many potential security flaws inherent in smartphones, especially when those phones are used for both business and personal use.
  • Ofer Ben-Noon, Co-founder and CEO, Argus Cyber Security – Argus’s Intrusion Prevention System uses cloud-based algorithms to monitor every signal sent to a car’s network and detect and block suspicious transmissions. This prevents the potential of remote hacking that could paralyze a car.

Related: How to Handle Internet of Things Security
A world of Internet of Things is a world where your network has billions of possible entryways for hackers.

Find out more about these individuals at Wired.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security, Internet of Things

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. Albert Barkley says

    April 3, 2017 at 8:12 am

    Although this is true that there are lot of people like above one that works to make better security of internet and communication but still, there are some gaps that are needed to work on them.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.