• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Industry

IP-rich data fuels cyber risks for manufacturers adopting IoT

FutureIoT Editors by FutureIoT Editors
December 23, 2022
Photo by Caleb Oquendo: https://www.pexels.com/photo/man-wearing-black-blazer-3051576/

Photo by Caleb Oquendo: https://www.pexels.com/photo/man-wearing-black-blazer-3051576/

Intellectual Property (IP) theft, including industrial trade secrets, is one of the costliest security breaches costing the U.S. economy, which is between US$225 billion and US$600 billion annually. Most IP forms are stored as IP-rich data via digital mediums, including cloud platforms, servers, and laptops.

ABI Research forecasts that manufacturing Internet of Things (IoT) connections will increase by a CAGR of 53% globally, significantly expanding the vector of attack to obtain IP-rich data. While this is a potential opportunity for cybersecurity vendors, they must explicitly showcase that their usual IT/OT solutions can also help protect IP.

Solutions available in the market

Vendors that provide Identity and Access Management (IAM) or those providing encryption services contribute to IP security but need to emphasize that IP security is embedded in their solutions.

“In the manufacturing sector, IP breaches happen in three stages, namely during design, production, and post-manufacturing when a product is in the market and can be reverse-engineered, jailbroken, or copied,” says Michael Amiri, a senior industrial cybersecurity analyst at ABI Research.

He added that most breaches happen via access to compromised data. Companies with higher R&D spending should especially be vigilant. A few clicks can neutralise many years of costly research to benefit from the first mover advantage.

Michael Amiri

“With the embrace of Industry 4.0 comes opportunities and threats, including an expansion of cyberattacks. Manufacturing IoT connections increase exposure to IP theft by contributing to more points of entry and expanding the attack surface. In such an environment, cybersecurity providers act as IP gatekeepers by securing sensitive data.”

Michael Amiri

Encryption technologies

Protecting sensitive data is a primary strategy for protecting IP. Protecting data can be achieved by identifying, managing access, and encrypting sensitive data. Vendors like Spirion discover and classify sensitive data, while others like Utimaco or Thales encrypt critical data.

Amiri stressed that encryption is a very effective tool to protect IP, especially when IP is on the cloud and shared between a host of users. But encrypting all data and servers could impede workflows.

“More importantly, encryption does not work against insider threats, as we saw in the Edward Snowden case. All that was needed was the required credentials to access the encrypted files. Case in point to why access management is so important for securing sensitive data,” he added.

Data protection providers, such as Fasoo, secure sensitive data by applying document rights policies to control data in use. “The best way to protect sensitive data is to limit the data to those who need the data the most, and even then, to deploy zero-trust strategies,” Amiri continued.  

After the production phase, other measures need to be adopted to secure IP. This is especially important because when counterfeit products enter a product line, they cause subpar final production, resulting in a serious financial and reputational loss.

An array of anti-counterfeiting technologies such as DNA and glue coding, laser engraving of parts, security threads, anti-alteration devices, and Radio-frequency identification (RFID) will help avoid this.

Rise of confidential computing

In digital products, confidential computing technology protects data by leveraging a Trusted Execution Environment (TEE) in a Protected Central Processing unit (CPU), thus protecting business logic, algorithms, and analytics functions. Confidential computing is especially useful in protecting proprietary software and can be used to secure IP in gaming and software technologies.

Authentication Integrated Circuits (IC) are another form of verification typically used in printers, where an embedded IC allows only authentic ink cartridges to work with the machine. Rambus’ CryptoFirewall Anti-Counterfeiting System provides another layer of security by delivering chip anti-tamper protection that secures printing machines against counterfeit ink cartridges. Authentication ICs are increasingly used in other products, such as smart home devices and charging stations, to authenticate car batteries.

According to Amiri, securing IP in industrial settings is increasingly related to cybersecurity, data management, and securing chips design.

“Counterfeiters will still try to reverse engineer moulds and steal industrial equipment designs, but the shift toward Industry 4.0 means data is the main driver of IP theft. Moulds can be made in the United States or Europe instead of China to secure them, but internet connections can’t be shut down and brought back to the United States,” concluded Amiri.

Related:  Robotics startup Agerris raises $6.5 M to develop smart farm systems
Tags: ABI Researchintellectual propertyIP theft
FutureIoT Editors

FutureIoT Editors

No Result
View All Result

Recent Posts

  • Standardisation and tech are keys to unlocking growth in Asia's supply chains
  • AI to fuel the rise of zero touch networks
  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Standardisation and tech are keys to unlocking growth in Asia's supply chains

Standardisation and tech are keys to unlocking growth in Asia's supply chains

May 9, 2025
Photo by Polina Tankilevitch: https://www.pexels.com/photo/hand-of-a-woman-showing-palm-with-a-word-no-4830656/

AI to fuel the rise of zero touch networks

May 8, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe