{"id":31752,"date":"2019-07-19T03:11:00","date_gmt":"2019-07-19T07:11:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31752"},"modified":"2019-07-19T03:11:00","modified_gmt":"2019-07-19T07:11:00","slug":"securing-the-internet-of-things-requires-flexibility-experts-say","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/07\/19\/securing-the-internet-of-things-requires-flexibility-experts-say\/","title":{"rendered":"Securing the Internet of Things Requires Flexibility, Experts Say"},"content":{"rendered":"\n<p>As more everyday items like toasters, TVs and thermostats become connected to the internet, the rules for keeping those devices secure must be able to evolve as quickly as the technology itself, experts said Tuesday.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/07\/wall-thermostat-543131__340.jpg\" alt=\"\" class=\"wp-image-31753\" width=\"220\" height=\"159\"\/><\/figure><\/div>\n\n\n\n<p>Congress and government regulators have spent years debating the best strategies for securing the&nbsp;<a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2017\/10\/can-governments-buying-power-create-more-secure-internet-things\/141534\/\">billions<\/a>&nbsp;of network-connected devices that permeate virtually every corner of the physical world. Last month, the National Institute of Standards and Technology&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8228\/final\" target=\"_blank\">published guidelines<\/a>&nbsp;managing security on the <strong>internet of things<\/strong>, and lawmakers have introduced&nbsp;<a href=\"https:\/\/www.nextgov.com\/emerging-tech\/2019\/06\/house-oversight-votes-secure-connected-devices-government\/157704\/\">multiple<\/a>&nbsp;<a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2019\/03\/lawmakers-revive-bill-secure-agencies-connected-devices\/155497\/\">bills<\/a>&nbsp;over the past year meant to secure connected devices purchased by federal agencies.<\/p>\n\n\n\n<p>While today most people agree the tech should follow a set of minimum security standards, experts fear regulations that are \u201coverly prescriptive\u201d could hinder security rather than help.&nbsp;<\/p>\n\n\n\n<p>\u201cIt\u2019s hard to tell manufacturers a discrete set of things you should do till the end of time for all devices, because [that guidance] is based on today,\u201d Michael Fagan, a cyber specialist at NIST, said on a panel hosted by the Telecommunications Industry Association. \u201cWe don\u2019t know where devices will go in the future.\u201d  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.nextgov.com\/cybersecurity\/2019\/07\/securing-internet-things-requires-flexibility-experts-say\/158283\/&amp;ct=ga&amp;cd=CAEYCSoTMzY1Mzc2ODExNTMyMzYyNDE3MDIaYTJkNzVhMDE0OWE4MjFkNzpjb206ZW46VVM&amp;usg=AFQjCNHy2KnnKotH0bltKI56-vj8JMXLWw\">Read on: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more everyday items like toasters, TVs and thermostats become connected to the internet, the rules for keeping those devices secure must be able to evolve as quickly as the technology itself, experts said Tuesday. Congress and government regulators have <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/07\/19\/securing-the-internet-of-things-requires-flexibility-experts-say\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-31752","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31752"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31752\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}