Blog - article

Sorry, this blog post has not been posted yet. Come back and check again later!

The Impact of IoT on Your Attack Surface

By:
Wade Williamson
September 29, 2015

Researchers from Vectra Threat Labs recently performed an in-depth analysis of vulnerabilities found in a common Belkin wireless repeater. Today in an article on Dark Reading, Vectra CTO Oliver Tavakoli digs into why seemingly innocuous vulnerabilities can become serious problems in the context of the Internet of Things (IoT). Read the full article here.

Of particular importance to security teams, IoT is not only bringing far more devices into the network, but they are also devices that very rarely get patches and updates. This means that vulnerabilities can be left unaddressed for months or even years. Likewise, these devices are unlikely to be protected by signatures and will almost assuredly be unable to run client-based security.

This is yet another reason that organizations should supplement their traditional approach to security with behavior-based models of threat detection. It’s fast becoming the best way to detect an active threat or attack regardless of the type of device that was first infected.

Stopping every unknown exploit against a wireless repeater, air conditioner, or any of the thousands of other devices on the market is an impossible task. But if any of those devices begin scanning the network, spreading the infection or establishing a hidden tunnel between your network and an attacker outside your network, that behavior and dozens of others like it should immediately sound alarms.

With behavior-based threat detection and device context, you can have unified security context for your entire network in a way that signatures and malware analysis never will. And you’ll regain more control to stop attacks in progress throughout increasingly diverse and growing networks.

About the author

Wade Williamson

Wade Williamson is a cybersecurity writer, product manager and marketer. Wade held a position as director of product marketing at Vectra with previous experience as a security researcher at Shape Security. Prior to Shape Security, he was a senior security analyst at Palo Alto Networks.

Author profile and blog posts

Most recent blog posts from the same author

Breach

The Anthem Breach and Security Going Forward

February 6, 2015
Read blog post
Cybersecurity

Bringing attack detections to the data center

September 13, 2016
Read blog post
Breach

The new vulnerability that creates a dangerous watering hole in your network

July 12, 2016
Read blog post