Page 1 of 1

Particularly emphasized that

Posted: Thu Feb 13, 2025 5:14 am
by relemedf5w023
Artem Gavrichenkov, technical director of QRator Labs, in his report “IoT: a real threat or marketing?” expressed concern about the growing army of cheap IoT devices. Indeed, various analytical studies show a large number of cheap brands and devices whose security is unlikely to be given attention. The expert drew a parallel between IoT security issues and global warming, expressing concern about the uncontrolled growth of vulnerable devices.

Hecheap devices (Chinese consumer goods) are not audited or updated by anyone, and after their release, the manufacturer often simply closes down” and doubted that there would be enough money in the business models of IoT manufacturers for IoT security. In this case, the consumer can only rely on the regulator, which can act as a natural balancer for the IoT market - just as the regulator acts as a balancer for the food market, not allowing the release of outright poison.

Artem Gavrichenkov suggests proactively solving IoT switzerland whatsapp data issues by integrating security into the manufacturer's marketing offer. A good IoT device is also a secure IoT device, the expert says, citing the example of car manufacturer Volvo, which led the revolution in traffic safety in the European Union several years ago.

In turn, Kirill Ermakov, technical director of Qiwi, criticized those vendors who release products following fashion (for example, the fashion for IoT as such), instead of analyzing the real current needs of customers.

Dmitry Gadar, Director of the Information Security Department of FC Otkritie, in a certain sense agreed with Kirill Ermakov during the subsequent discussion "Pseudoscience. Discussion of trends in information security from vendors and customers", stating that the offer of products by vendors to customers is pseudoscience, as well as the incompetence of the customer, since a qualified customer always knows what he needs. In particular, the expert spoke about the task facing the bank's information security service of reducing the time to detect threats to corporate resources (time-to-detect).