Read the full article by Charlene Chin via EdgeProp.
Smart-living amid Covid-19
How to Secure IoT Connectivity and Onboarding Without Writing Code
Security breaches where private files and personal data are stolen has sadly become commonplace in today’s digital age. Even more terrifying are the security breaches where a hacker gains access to your home, peering through cameras, listening on microphones, and even unlocking your front door. These are some of the risks posed by the Internet of Things (IoT). Several government and technology agencies have proposed rules and guidelines that could be adopted by technology companies to combat the most common security and privacy vulnerabilities, but a more comprehensive strategy is required. Security is a complex and dynamic problem that can’t simply be solved by a dedicated one-time effort. The issue is rapidly increasing as new products and services are introduced. Small developers, focused on creating the next generation of innovative connected products, often don’t have the resources and expertise to properly secure them. This has led to a deluge of highly insecure devices flooding the market and consumers’ homes.
The Open Connectivity Foundation (OCF) has created an open international standard, complete with open source software and a world-class security infrastructure that directly addresses this issue. Industry-leading security has been built into the OCF design: from the specifications, the software, and the development tools, to labs around the world that certify products and manage a Public Key Infrastructure (PKI) system. Using these resources, a fully functional and interoperable IoT prototype that includes world-class security can be built in a matter of minutes. This paper will demonstrate how that is done.
Read the full article by OCF members Kyle Haefner and Clarke Stevens via Embedded.
Why We Need to Secure IoT Connections Sooner than Later
As most of us are aware, connectivity is growing all around us. Businesses are becoming more connected. In recent days, more and more employees of businesses are working from home and needing secure connectivity. The number of IoT devices continues to grow in mass amounts globally. Those devices are creating a lot of connectivity around us, but that connectivity also creates a lot of security risk and exposure that a lot of consumers who are going about their normal lives are not aware of.
What I’d like to talk about today is the growing need to secure that connection, whether that be within a business, whether that be with a connected device in a consumer’s home, or whether that be a consumer browsing the internet. All of that connectivity needs to be done in a way that is secure, and the importance of that is so critical.
Read the full podcast transcript featuring Mike Nelson via Help Net Security.
Connected homes: APAC embraces smart home living
In a few more years, our homes will become another key interface, increasingly similar to our smartphones, where a wide range of products and services are integrated. The battle for the smart home has started, with many tech giants and a range of industries already making a beeline for Asia.
According to forecast by consulting firm A.T. Kearney, the Asian smart home market will grow to US$26 billion in 2022 and surge to US$115 billion by 2030, accounting for more than 30% of the global market. Growth in the region will be driven by China and Japan, with highly-connected economies such as Singapore, South Korea and Taiwan also playing a key role.
Read the full article by Sharon Soh via Marketing Interactive.
Interoperability: CHoIP, Zigbee, Z-Wave, OCF
The ideal smart home experience for consumers is one in which a broad range of smart home devices are setup effortlessly and work seamlessly together, providing convenience to the user and enhanced value for all products in the ecosystem. The connectivity, automation, and data sharing derived from integration can create a differentiated user experience, when done well. A number of companies, and organizations continue to work on improving interoperability:
Read the full article by Brad Russell of Parks Associates.