CA, HP, Identiv, ImageWare Systems and Nok Nok Labs Are Featured on SecuritySolutionsWatch.com
Mr. Jim Reno, Distinguished Engineer, Chief Architect, CA Technologies, told us, "IoT unquestionably introduces new avenues for vulnerabilities. As with many new technologies, IoT is moving fast in introducing new functionality, and security, which sadly is often an afterthought, lags behind. We need a different mindset about devices. A thermostat isn't just a thermostat, it's both a computer as well as possibly an active agent on a network. There are two sides to how we need to think about connected devices. We first need to think of them as computers, on a par with any other computer system. They can be attacked by many of the same pathways. Once attacked, their primary function can be subverted. For example, your home security system might be made to unlock your doors. The second side is to think of these devices as if they were users -- that is, as active agents with identities that reach out on the network and do things. In doing so, the same sorts of security questions around identity arise as for any other computer or user."
For the complete interview with Mr. Jim Reno, Distinguished Engineer, Chief Architect, CA Technologies please click here: www.securitysolutionswatch.com/Interviews/in_Boardroom_catechnologies_Reno.html