May 09, 2017 – Meet Sensify Security at IoT World 2017
PALO ALTO, Calif., April 19, 2017 /PRNewswire/ — Sensify Security, a company that delivers intelligent IoT security services at the edge bringing unprecedented levels of visibility, control and automation capabilities in industrial cybersecurity operations, announces it has joined the OpenFog Consortium to help establish global security and privacy requirements for fog computing. Fog computing is the new, necessary architecture to run data-dense, mission critical Internet of Things (IoT) and 5G applications.
In the recent few weeks, we saw a surge in Permanent Denial of Service Attacks (PDoS) as a consequence of the BrickerBot botnet. BrickerBot is similar to Mirai in that it also targets IoT devices with hard-coded authentication credentials. However, unlike Mirai, once it gains access BrickerBot renders the connected device useless, or “bricked” by manipulating its memory and kernel configuration. This type of attack is capable of completely halting operations that depend on the underlying IoT device resulting in downtime and damages. ICS-CERT recently issued an advisory on this type of attack.
March 22, 2017 – Meet Sensify Security at HANNOVER MESSE 2017
Attending HANNOVER MESSE 2017 #HM17? We would like to meet you and introduce you to our products and technology at Hall 3, Stand D13.
To get your complimentary eTicket, use code
Rzyn4hy9bz4dp5 when you register.
January 23, 2017 – Join Sensify Security at RSA® 2017
RSA® 2017 is just around the corner. Attending? Come visit us at booth #N4525 in North Expo to experience our product which secures IoT in decentralized ecosystems!
December 19, 2016 – Meet Sensify Security at RSA® 2017
Are you going to attend RSA® 2017 expo? We would like to meet you and introduce Sensify Security product and technology.
To get your complimentary Expo pass from Sensify, use code XE7SENSEC when you register for RSA® 2017.
December 12, 2016 – Common Authentication Vulnerabilities on Connected Devices by Andy Sugiarto
Connected devices are everywhere and their operations affect each one of us at any moment of our everyday life. There are many examples in home appliances, power generation, aviation, manufacturing, and transportation. The list is endless, but is only getting longer as the adoption of Internet of Things (IoT) is rapidly growing. There are common vulnerabilities such as hardcoded passwords and remote access without authentication. In fact, these vulnerabilities continue to be exploited today. Exploitation of default passwords for access was demonstrated recently via a distributed denial-of-service (DDoS) attack on Dyn’s DNS service using the Mirai botnet on October 21, 2016. The lack of authentication over the maintenance interface of broadband routers affected internet connectivity of about 900,000 Deutsche Telekom customers. This attack occurred on November 26, 2016. In both cases, attackers were using over one million connected devices. We should not assume these connected devices are secure by default. We absolutely can and must give significant attention to securing them.
Blockchain has the potential to transform the way industries conduct business transactions. This will require a complete ecosystem of industry players working together, allowing businesses to benefit from the network effect of blockchain. To help support these organizations, IBM (NYSE: IBM) announced today a blockchain ecosystem to help accelerate the creation of blockchain networks. …
The IBM blockchain ecosystem is an open environment where organizations can collaborate on shared or complementary technical and business visions using the Hyperledger Fabric, and access education and development support. Because blockchain is a network business, an environment where all interested parties can share tools, information and relationships is critical. Start-ups, ISVs and SIs are investing in blockchain and have embraced the Hyperledger Fabric. Many companies are already joining the IBM blockchain ecosystem, including: …
Sensify Security is a Palo Alto based IoT security startup that builds higher resistance to cyber-weapons by enabling operators to enforce access control in a decentralized manner within their operating environments. Its tamper-resistant propagation of security services to gateway-based points of enforcement leverages Hyperledger Fabric, and offers operators centralized control, policy management and compliance.
Mirai, a now-common term in the tech industry, was relatively unknown just over a month ago. In its simplest form, Mirai is a malware that exploits a vulnerability that is very common among household devices such as DVRs, IP cameras, and baby monitors. These devices typically ship with pre-configured (“hard-coded”) usernames and passwords permitting administrator level control over the device. A malicious actor could utilise Mirai to attack devices en masse. Upon device takeover, the devices may be leveraged any which way, including being deployed to perform distributed denial of service (DDoS) attacks on innocent parties on the internet. The devices could even be turned against their legitimate owners by taking devices offline or by compromising data integrity. This was what occurred on October 21st, 2016, when a distributed Mirai botnet of up to 100,000 endpoints was centrally orchestrated to perform two DDoS attacks on the DNS servers being managed by Dyn. These attacks effectively took the servers down, affecting the backbone of the internet. The estimated cost exceeds millions of dollars in lost productivity and sales for e-retailers like Netflix, PayPal, Reddit, and Twitter due to downtime.
PALO ALTO, Calif., Dec. 5, 2016 /PRNewswire/ — Sensify Security – a company that delivers decentralized information security services for industrial & commercial IoT operations with centralized control, policy management & compliance – recently joined the The Industrial Internet Consortium® (IIC), the global, member-supported organization that promotes the accelerated growth of the Industrial Internet of Things (IIoT). Sensify Security is in the forefront of IoT security by enabling operators to control access between users, applications, control systems & sensor devices by hosting sophisticated information security services within their operating environments. Sensify’s blockchain-based consensus protocol builds high levels of tamper-resistance into these services in conjunction with industrial-scale control of policies & compliance. Sensify has partnered with industrial vendors & operators across verticals like energy distribution (smart-grids), aviation, building management & transportation. The IIC membership creates a platform for multiple vendors and Sensify Security to collaborate and create industry standard security solutions.