Coming Soon to a Network Near You: More Shadow IoT

News of former Microsoft head of product Panos Panay's exit caused a small stir in the tech industry when it was learned he would join Amazon to lead that company's product division.
Precisely what Amazon and Panay have in mind for that ecosystem has yet to be announced, but the cybersecurity community should pay close attention.
Whether industrial, scientific, medical, or consumer, the number of Internet of Things devices being developed, produced, sold, and connected to networks is on the rise.
Research firm IoT Analytics believes there will be nearly 30 billion IoT devices in use by 2027, more than twice what it estimates were in service just five years ago.
Every one of those internet-connected devices are a potential security threat for the enterprises that deploy them.
Even if all the devices that Panay's product team develops for Amazon are meant solely for the consumer market, they will still increase the threat to commercial, government, healthcare, educational, and other organizations.
Consumer IoT devices are already operating in commercial networks in large numbers, and the ubiquity of consumer IoT operating on commercial networks means it is inevitable that many of those future Amazon ecosystem devices will find their way onto corporate networks, too.
Our post-device discovery analysis of connected devices found in commercial environments shows that between 15% and 20% of the total inventory of devices operating were previously unknown to IT and security teams, including things like Kegerators, Ring-type surveillance cameras, and Tesla automobiles.
Sometimes those consumer grade devices have a legitimate purpose for deployment in a commercial network.
We've discovered Peloton exercise bicycles used in healthcare facilities for patient rehab, and Alexa smart speakers for helping receptionists and others with administrative duties.
We've also found things like gaming consoles in a police precinct station sapping bandwidth and IT efficiency.
Often these devices operate outside the view of security teams, and since they are not engineered to be managed and secured by IT, they represent a serious security gap that threat actors are all too eager to exploit.
Whether they are the point of entry, or used as a pathway for attackers to reach their target, the existence of undiscovered and vulnerable IoT devices already represents a major challenge for security leaders.
In May of 2023 Amazon announced it had shipped more than a half-billion Echo devices since introducing the product in 2014.
If Amazon's device ecosystem ambitions include new categories of products that, in aggregate, reach a similar scale and millions of new devices are shipped each year, that will be a problem for security teams.
Even a small fraction of those devices that will find their way onto corporate networks will create new and compound existing security challenges for organizations not adequately prepared for the increased risk, especially if they have no way of discovering, monitoring, and ultimately securing those devices.
Amazon's hiring of Panos Panay and its investment in product innovation is a good thing.
As with the success of the Echo and Alexa product families, the popularity of any new devices created under Panay's leadership will mean that those products-whatever they do-have made our lives better in some way.
Because success breeds success, large competitors like Microsoft, Google, Apple will follow suit, and many more smaller innovators will be inspired to create other new and exciting devices.
Amazon's announcement should be taken as fair warning that enterprise IT networks will soon be even harder to defend.


This Cyber News was published on www.securityweek.com. Publication date: Thu, 11 Jan 2024 16:13:03 +0000


Cyber News related to Coming Soon to a Network Near You: More Shadow IoT

Shadow AI poses new generation of threats to enterprise IT - Unsanctioned AI, also known as shadow AI, poses even more challenges. Shadow AI is just like every other stripe of shadow IT - unsanctioned technology that corporate employees deploy ad hoc and use in ways unknown to or hidden from an organization's ...
4 months ago Techtarget.com
How to Eliminate Shadow IT and Achieve a Secure SaaS Environment in 2023 - The prevalence of Shadow IT has grown exponentially over the years, with most organizations being unaware of the security risks of unauthorized cloud applications. Shadow IT is any application or cloud service being used by employees for business ...
1 year ago Thehackernews.com
IoT Security: Safeguarding Business IoT Devices - The security of IoT devices is of utmost importance as businesses increasingly rely on them to streamline operations and enhance productivity. In this discussion, we will explore the importance of IoT security in safeguarding business IoT devices and ...
4 months ago Securityzap.com
IoT Security for Business: Safeguarding Connected Devices - In this discussion, we will explore the significance of IoT security for businesses and effective strategies for safeguarding connected devices. With the increasing number of connected devices in business environments, the need for effective IoT ...
5 months ago Securityzap.com
How To Improve Security Capacities of The Internet of Things? - The security of the Internet of Things is one of the main challenges of today. Many IoT assets could get an easy target to cyber attacks and it's highly recommended to somehow cope with these requirements. The best practice is something that would ...
5 months ago Cyberdefensemagazine.com
The dark side of Optimize Mac Storage: What you need to know if you rely on it - During the course of the past few days, it's become clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that design flaw can lead to extensive data loss. If you have more data in your ...
1 year ago Zdnet.com
The Role of IoT in Modern Education - From smart classrooms equipped with IoT devices to personalized learning platforms, IoT has paved the way for a more immersive and tailored educational experience. Overall, the integration of IoT in education holds great promise in transforming the ...
6 months ago Securityzap.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
6 months ago Esecurityplanet.com
IoT Security in the Age of Cyber Threats - These vast neural networks enable IoT devices to seamlessly connect the mundane and the sophisticated into the digital fabric of the internet. This range of devices includes everything right from kitchen appliances and industrial machinery to smart ...
5 months ago Feeds.dzone.com
Cyber Insights 2023: ICS and Operational Technology - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. At the same time, ICS/OT is facing an expanding attack surface caused by ...
1 year ago Securityweek.com
Cinterion Modem Vulnerabilities Leave IoT and Industrial Networks Exposed - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Hackread.com
VMware vCenter RCE Vulnerability: What You Need to Know - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 days ago Securityboulevard.com
5 Types of Crypto You Didn't Know Existed - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Hackread.com
Microsoft Alerts More Users in Update to Midnight Blizzard Hack - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 day ago Gbhackers.com
Microsoft tells more customers their emails have been stolen The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 days ago Go.theregister.com
Anonymous Sudan's DDoS Attacks Disrupt Network at Israeli BAZAN Group - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
5 months ago Hackread.com
Control the Network, Control the Universe - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Securityboulevard.com
New Wi-Fi 'SSID Confusion' Attack Let Attackers Connecting Malicious Network - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Cybersecuritynews.com
Particle Network's Intent-Centric Approach Aims to Simplify and Secure Web3 - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
7 months ago Hackread.com
Delivering Digital Immunity: Taking a Holistic Approach to Optimize Your Network - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Securityboulevard.com
Fake e-commerce network scams $50M from Euro, Oz, US buyers The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Theregister.com
Network Responses To Russia's Invasion of Ukraine In 2022: A Cautionary Tale For Internet Freedom - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Securityboulevard.com
TeamViewer responds to security 'irregularity' in IT network The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 days ago Go.theregister.com
TeamViewer confirms Russia broke into its corp IT network The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
4 days ago Go.theregister.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)