sb-au logo
Story image

IBM X-Force takes on IoT security across connected devices - and vehicles

26 Jul 2017

IBM X-Force researchers are tacking on vehicle and IoT security as part of a new initiative by IBM Security. Researchers will focus on testing back end processes, apps and physical hardware which accesses and managed smart systems.

The new, specialised practice is the company’s pre-emptive response to a booming market for data connectivity in vehicles, which Gartner expects will reach 61 million by 2020.

Earlier this year X-Force researchers discovered major security holes in connected cars. Some cars insecurely transferred ownership between owners, which can create gateways to malicious vehicle takeovers such as door locks, remote starting and being able to track the current owner through a mobile app.

Global head of IBM X-Force Red, Charles Henderson, says security testing is becoming a key component in clients’ security programs.

X-Force researchers worked with more than 12 vehicle manufacturers and third-party automotive suppliers to build expertise and programmatic penetration and consulting services. IBM Security says that by forming this process, it will pave the way for shaping industry best practices and standardising security protocols.

X-Force researchers will also be applying security to IoT security as a whole. The services will be delivered alongside the Watson IoT platform to provide custom-designed security services to firms developing IoT solutions across all industries.

Gartner predicts that 8.4 billion connected things will be used worldwide this year, and will reach 20.4 billion by 2020.

“Finding issues in your products and services upfront is a far better investment than the expense of letting cybercriminals find and exploit vulnerabilities. Our own investments in people, tools and expertise have more than tripled our security testing capabilities in the first year of IBM X-Force Red, making our offense our clients’ best defence,” Henderson adds.

By applying IBM X-Force to the Watson platform, the company says that security testing through an entire IoT device’s lifecycle can be the best way to find vulnerabilities in a proactive fashion.

So far the cloud platform is ‘security by design’ that has built-in security controls and delivered as a cloud-based service. 

IBM Watson IoT Platform offering manager James Murphy says it’s a combination of reach, investment, collaboration and security that helps position the company as a trusted IoT partner.

“With IoT technologies permeating the farthest corners of industry, IBM is bringing our Watson IoT Platform and X-Force Red security talent together to address present and future concerns.”

Earlier this year IBM X-Force also released a cloud-based collaboration platform for security professionals and clients, named ‘The Red Portal’. The platform provides an end-to-end view of security testing programs. The firm also created its own password cracker, named ‘Cracken’, designed to help clients improve their password hygiene.

X-Force marked its first-year of operation by bringing security specialists Cris Thomas and Dustin Heywood to further its in-house talent. 

Story image
Cyber-attacks thrust IT compliance to the top of the business agenda
If an organisation is running on the cloud, its ecosystem has to be compliant with industry standards and frameworks. Here are some tips on how to ensure compliance processes are fit for purpose.More
Link image
Remote workforces can be a security hazard - but they don't have to be
Many companies have adjusted to a new reality: a workforce working from home. These workers need access to applications and files that sit inside the enterprise network, all while prioritising security. Here's how it can be done.More
Story image
How business can lift protection against mobile threats
The mobile phone has become ubiquitous both personally and professionally. Many of these devices are able to access corporate networks and sensitive data, yet many may not be as protected or secured as company-owned devices.More
Story image
80% of security breaches involve exposure of customer data - IBM
The new report from IBM indicates that 80% of surveyed organisations reported having exposed customers’ personally identifiable information (PII) as a result of a breach.More
Story image
Huawei introduces all-flash OceanStor Dorado arrays
All-flash offers stability and high-performance storage with extremely low levels of latency – and it can offer reliability in the event of a disaster.More
Download image
How do your workforce capabilities compare to industry standards?
Managing today’s workforce-related challenges requires a comprehensive security and risk management approach that includes capabilities to meet many different objectives.More