• About
  • Subscribe
  • Contact
Friday, March 20, 2026
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

AI and IoT are opening new vectors of cyberattack

by FutureIoT Editors
March 19, 2024
Photo by cottonbro studio: https://www.pexels.com/photo/hand-putting-a-usb-flash-drive-in-a-laptop-5474284/

Photo by cottonbro studio: https://www.pexels.com/photo/hand-putting-a-usb-flash-drive-in-a-laptop-5474284/

Interconnected technologies are the growing network of devices, systems and applications connected to the internet and each other. They transform enterprises, enabling them to gather more data and automate processes. But they also bring new risks and challenges when securing business assets and safeguarding customers.

A recent Kaspersky study found that AI and IoT are already used by 61% and 64% of companies respectively, while 28% and 26% of companies plans to adopt them within two years. Data spaces are used by 27% of businesses, with more than half (54%) intending to adopt them soon.

Other interconnected technologies (digital twins, AR, VR, web 3.0, 6G), are used by 8-20% of companies participating in the survey, but more than 70% are considering integrating them into their business processes soon.

The expanding use of AI and IoT has the potential to expose organisations to new vulnerabilities. According to the research, 13-14% of organisations from the region think AI and IoT are ‘very difficult’ or ‘extremely difficult’ to protect, while only 6% of the AI users and 10% of the IoT owners believe their companies are fully protected.

Adrian Hia

According to Adrian Hia, managing director for Asia Pacific at Kaspersky, “Undoubtedly, new technological tools play a vital role in improving the efficiencies and productivity of enterprises in the region. However, there are loopholes, particularly in cybersecurity, that need to be addressed. Our recent study showed more than half of the companies are using AI and IoT in their organisations, but 21% of them think AI and IoT are somewhat difficult to protect. It shows that there is a skills and knowledge gap that needs to be patched with urgency.”

Recommendations going forward

Source: Kaspersky 2024

Given the scale of change that interconnected technologies is likely to bring, organisations must develop a strategy to implement and protect them. Kaspersky recommends four effective ways to ensure organisations are prepared to protect interconnected technologies:

Adopt secure-by-design principles. By integrating cybersecurity into each stage of the software development lifecycle, secure-by-design software and hardware become resilient against cyberattacks, contributing to the overall security of digital systems. Cyber Immune solutions based on KasperskyOS, for instance, allow companies to minimize the threat surface and significantly decrease the ability of cybercriminals to perform a successful attack.

Train and upskill your workforce. Building a cyber-aware culture requires a comprehensive strategy that empowers employees to gain knowledge and put it into practice. With Kaspersky Expert training, InfoSec professionals can advance their skills and defend their companies against attacks.

Upgrade your cybersecurity solutions and use centralized and automated platforms such as Kaspersky Extended Detection and Response (XDR). As companies adopt interconnected technologies, they need cybersecurity solutions with more advanced features, enabling them to collect and correlate telemetry from multiple sources and provide effective threat detection and rapid automated response. 

As many AI solutions are built on containers, it’s important to secure the infrastructure they are integrated in with cybersecurity products – such as Kaspersky Container Security – that allows companies to detect security issues at every stage of the app lifecycle, from development to operation.

Meet regulations to avoid legal problems or reputational damage, by ensuring your cybersecurity practice meets changing standards and legal requirements.

Related:  Only 20% of industrial firms prioritise IoT-related incidents
Tags: attack vectorsKaspersky

FutureIoT Editors

No Result
View All Result

Recent Posts

  • Cainiao to transform e-commerce with global robotic warehouse network
  • Study reveals supply chain attacks emerge as top cyber threat in APAC
  • Zoom enhances workflow automation with expanded AI capabilities
  • New industrial UPS engineered for 50°C operation and dust resistance
  • GENESIS simulator addresses inventory challenges with AI innovation

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Artificial Intelligence
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Cloud, Platforms and Ecosystems
  • Commercial
  • Compliance and Governance
  • Computer, Storage, Networks, Connectivity
  • Construction
  • Consumer
  • Culture and Behaviour|People
  • Customer Engagement
  • Data Protection
  • Devices
  • Digital Transformation
  • Endpoint Security
  • ESG
  • ESG and sustainability
  • Future Workplace
  • FutureCOO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • HR, education and Training
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • People
  • Process
  • Remote work
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Tactics and Strategies
  • Technology
  • Telecommunications
  • TIBCO
  • Training and awarenes
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Cainiao Network

Cainiao to transform e-commerce with global robotic warehouse network

March 16, 2026
Photo by Tiger Lily: https://www.pexels.com/photo/photo-of-men-working-in-a-warehouse-4483860/

Study reveals supply chain attacks emerge as top cyber threat in APAC

March 13, 2026
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe