Securing the Internet of Things
Listen now
Description
There used to be a time when our appliances didn’t talk back to us, but it seems like nowadays everything in our home is getting smarter. Smart watches, smart appliances, smart lights - smart everything! This connectivity to the internet is what we call the Internet of Things (IoT). It’s becoming increasingly common for our everyday items to be “smart,” and while that may provide a lot of benefits, like your fridge reminding you when you may need to get more milk, it also means that all of those devices become susceptible to cyber attacks. On this episode of Security Unlocked, hosts Nic Fillingham and Natalia Godyla talk to Arjmand Samuel about protecting IoT devices, especially with a zero trust approach. Listen in to learn not only about the importance of IoT security, but also what Microsoft is doing to protect against such attacks and how you can better secure these devices.     In This Episode You Will Learn:   What the techniques are to verify explicitly on IoT devices  How to apply the zero trust model in IoT  What Microsoft is doing to protect against attacks on IoT  Some Questions We Ask:  What is the difference between IoT and IT?  Why is IoT security so important?  What are the best practices for protecting IoT?    Resources:  Arjmand Samuel’s LinkedIn Microsoft Security Blog Nic’s LinkedIn Natalia’s LinkedIn Related: Listen to: Afternoon Cyber Tea with Ann Johnson Listen to: Security Unlocked: CISO Series with Bret Arsenault  Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. 
More Episodes
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to...
Published 02/16/22
Published 02/16/22
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more...
Published 02/02/22