You are here

In the Cybersecurity Battle, the Endpoint is the Frontline | Cypress Semiconductor

In the Cybersecurity Battle, the Endpoint is the Frontline

Guest Blogger: Tanner Johnson, Senior Analyst, Connectivity & IoT, IHS Markit

More than two millennia ago, renowned Chinese military strategist and philosopher Sun Tzu authored the historic text The Art of War. In this document, Sun Tzu provided both strategic and tactical guidance on how any entity should manage potential adversarial conflicts. In one of his most poignant quotes, Sun Tzu wrote “The supreme art of war is to subdue the enemy without fighting”. This rings just as true for information security as it does for any military skirmish. For the Internet of Things, denying hackers the ability to compromise devices ends the conflict before it can begin.

When it comes to the development of connected devices, embedded security components are fundamentally essential for effective data protection. By baking data security into the foundational design of IoT devices, information security can be bolstered throughout the entire development process. This proactive measure is far easier to implement, and often less costly, than attempting to bolt security onto a connected IoT product after its launch. Additionally, a security breach stemming from a vulnerable device can result in a loss of customer faith in the manufacturer, making the expense of an insecure device extend well beyond the price of any patch or recall.

IHS Markit projects that the number of connected IoT devices in the market will reach nearly 40 billion by the end of 2020. That is equivalent to roughly five internet accessible devices for every individual walking the earth. Furthermore, this number is projected to surge to nearly 120 billion over the next decade. However, while these devices may introduce added functionality, capabilities, and convenience for their respective users, each one also adds to the size of an exponentially growing threat landscape. 

Every connected device provides a node of communication that data thieves could seek to compromise. These opportunities for hackers to access these devices are increasing substantially throughout the IoT, as there are no real limits to the type of device that can be granted internet connectivity. IoT communication has already been added to everything from appliances like coffee makers and washing machines, vehicles and aircrafts, medical devices, critical infrastructure, and industrial and manufacturing equipment. As cyber criminals become more sophisticated over time, the threats introduced by connectivity may require additional protection of the benefits enjoyed by the respective user.

As the sheer speed and volume with which data is generated continues to grow, ensuring proper protection and handling of that information becomes a proportionally difficult challenge. Demand for comprehensive and secure information management solutions are driving growth in the global IoT cybersecurity market. In accordance with this demand, IHS Markit forecasts that revenue from data security solutions will grow at a CAGR of 30% over the next five years due to increased calls for a worldwide consensus on information management standards.

The first line of defense for any IoT device are those security features that are embedded within, the device itself. One example of such a solution is the Programmable System-on-Chip, PSoC 6, MCU family from Cypress Semiconductor with its built-in security provisions. The foundational value of embedded security is providing a unique device identity by using root of trust for the purpose of device authentication. Furthermore, embedded security is vital to maintain effective information protection throughout the entire information chain of custody. Embedded security also protects the subsequent network and cloud domains used by the secure products connected to them.

For effective data security solutions within IoT devices to become more widely adopted, OEMs must incorporate embedded security and consumer privacy solutions into their products. Moreover, as the market demand for data security increases, IoT device OEMs can distinguish themselves in the market by establishing as secure and privacy conscious brand. The inclusion of front-line, embedded security solutions in end-point products delivers the brand security promise and will provide end users evolving long-term protection.

Tanner Johnson Senior Analyst, Connectivity & IoT, IHS Markit

Tanner Johnson is a cybersecurity analyst focused on IoT and transformative technologies at IHS Markit. His coverage is focused on examining the various threats that occupy the IoT technology domain, as well as opportunities and strategies that are emerging as data connectivity continues to expand.

Prior to focusing on IoT security, Tanner managed and contributed to a wide range of aerospace and defense forecast markets including services, intelligence, and cyber operations for Jane’s by IHS Markit. His passion for the cybersecurity market inspired him to seek out additional academic knowledge in the field, and led him to achieve a Master's Degree in Cybersecurity through Missouri State University.

Tanner has published several cybersecurity focused articles to Jane’s Intelligence Review, on a broad scope of topics ranging from quantum computing to digital forensics. He has extensive knowledge in information security, threat intelligence, malware investigation, as well as hacker techniques and incident response.

Tanner also holds a Bachelors of Science degree in Sociology from the University of Wisconsin - La Crosse as well as a Master's Degree in Defense & Strategic Studies from Missouri State University.

Blog: 

본 사이트의 모든 컨텐츠와 자료는 "있는 그대로" 제공됩니다. CYPRESS SEMICONDUCTOR와 해당 공급자는 그 목적에 관계 없이 이러한 자료의 적합성에 대한 표현을 하지 않으며 상업성, 특정 목적에의 적합성, 권리 및 제3자 지적 재산권의 비침해에 대한 모든 묵시적 보증과 조건을 포함하여(이에 제한되지 않음) 이러한 자료와 관련한 모든 보증과 조건을 부인합니다. CYPRESS SEMICONDUCTOR에서는 명시적 또는 묵시적으로 금반언이나 여타의 다른 방법으로 라이센스를 부여하지 않습니다. 이 사이트의 정보를 사용하려면 제3자의 라이센스 또는 CYPRESS SEMICONDUCTOR에서 제공하는 라이센스가 필요할 수 있습니다.

이 사이트의 컨텐츠에는 특정 사용 지침이나 제한이 포함되거나 그러한 제한이 적용될 수 있습니다. 모든 게시물과 이 사이트 컨텐츠 사용에는 사이트 약관이 적용됩니다. 이 컨텐츠를 사용하는 제3자는 제한 또는 지침을 따르고 이 사이트의 약관을 준수할 것이라는 데 동의합니다. Cypress Semiconductor와 그 공급자는 컨텐츠와 자료, 그 제품, 프로그램 및 서비스를 언제든 수정, 삭제, 개조, 개선, 향상 및 기타 변경하거나 예고 없이 컨텐츠, 제품, 프로그램 또는 서비스를 이동 또는 중단할 수 있는 권리를 보유합니다.