Artwork

محتوای ارائه شده توسط Evan Kirstel. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Evan Kirstel یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !

The Invisible Shield: IoT Security Challenges and Solutions

18:55
 
اشتراک گذاری
 

Manage episode 495234806 series 3499431
محتوای ارائه شده توسط Evan Kirstel. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Evan Kirstel یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Interested in being a guest? Email us at admin@evankirstel.com

The connected world of IoT devices brings incredible benefits—from smart manufacturing to intelligent agriculture—but also creates unprecedented security challenges. When billions of devices collect and transmit sensitive data in real-time, how do we ensure they're properly protected?
Rodrigo Ferreira, Senior Vice President of Sales at Thales Mobile Connectivity Solutions, reveals the uncomfortable truth about IoT security: most devices lack built-in protection from the start. "Security isn't by design," he explains, leaving critical vulnerabilities that attackers can easily exploit. Among the biggest concerns is weak authentication—devices using simple login credentials that can be compromised, potentially allowing attackers to impersonate legitimate devices or even take over entire systems. When those systems control power grids or medical equipment, the consequences could be devastating.
Secure device identity becomes the foundation for trust in our connected ecosystem. But authentication is just the beginning—data encryption throughout the collection, transmission, and storage journey is equally crucial. As Ferreira states, "It's not a matter of if you get hacked, it's a matter of when." Without proper encryption, compromised data can be easily exploited. The industry faces additional challenges with firmware updates (many devices simply can't be updated) and fragmented regulations across regions, making global IoT deployments particularly complex.
Despite these challenges, innovation continues with promising developments like the GSM-SGP32 specification, which simplifies secure connectivity across multiple carriers without complex integrations. Ultimately, IoT security requires collaboration across the entire ecosystem—no single player can solve it alone. As we build our connected future, the responsibility falls on all participants to prioritize security at every layer, from device to network to cloud. Learn more about Thales' approach to IoT security at upcoming industry events including Mobile World Congress Americas.

Support the show

More at https://linktr.ee/EvanKirstel

  continue reading

فصل ها

1. Introduction to IoT Security Challenges (00:00:00)

2. Identity and Authentication for IoT (00:02:25)

3. Updates and Lifecycle Management (00:06:10)

4. Regulations and Standards (00:07:56)

5. eSIM and SGP32 Innovation (00:09:36)

6. Future Threats and Solutions (00:13:40)

7. Closing and Upcoming Events (00:18:32)

474 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 495234806 series 3499431
محتوای ارائه شده توسط Evan Kirstel. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Evan Kirstel یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

Interested in being a guest? Email us at admin@evankirstel.com

The connected world of IoT devices brings incredible benefits—from smart manufacturing to intelligent agriculture—but also creates unprecedented security challenges. When billions of devices collect and transmit sensitive data in real-time, how do we ensure they're properly protected?
Rodrigo Ferreira, Senior Vice President of Sales at Thales Mobile Connectivity Solutions, reveals the uncomfortable truth about IoT security: most devices lack built-in protection from the start. "Security isn't by design," he explains, leaving critical vulnerabilities that attackers can easily exploit. Among the biggest concerns is weak authentication—devices using simple login credentials that can be compromised, potentially allowing attackers to impersonate legitimate devices or even take over entire systems. When those systems control power grids or medical equipment, the consequences could be devastating.
Secure device identity becomes the foundation for trust in our connected ecosystem. But authentication is just the beginning—data encryption throughout the collection, transmission, and storage journey is equally crucial. As Ferreira states, "It's not a matter of if you get hacked, it's a matter of when." Without proper encryption, compromised data can be easily exploited. The industry faces additional challenges with firmware updates (many devices simply can't be updated) and fragmented regulations across regions, making global IoT deployments particularly complex.
Despite these challenges, innovation continues with promising developments like the GSM-SGP32 specification, which simplifies secure connectivity across multiple carriers without complex integrations. Ultimately, IoT security requires collaboration across the entire ecosystem—no single player can solve it alone. As we build our connected future, the responsibility falls on all participants to prioritize security at every layer, from device to network to cloud. Learn more about Thales' approach to IoT security at upcoming industry events including Mobile World Congress Americas.

Support the show

More at https://linktr.ee/EvanKirstel

  continue reading

فصل ها

1. Introduction to IoT Security Challenges (00:00:00)

2. Identity and Authentication for IoT (00:02:25)

3. Updates and Lifecycle Management (00:06:10)

4. Regulations and Standards (00:07:56)

5. eSIM and SGP32 Innovation (00:09:36)

6. Future Threats and Solutions (00:13:40)

7. Closing and Upcoming Events (00:18:32)

474 قسمت

همه قسمت ها

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش