Application Security , Cybercrime , Cybercrime as-a-service

How to Better Secure IoT Devices and Tech

Leslie Daigle of GCA on No-Default Passwords, Software Updates
Leslie Daigle, CTO, Global Cyber Alliance

Since 2019, the Global Cyber Alliance has been using a custom IoT honeypot solution to collect data about IoT attacks. The tool replicates one IoT device across multiple IP addresses and physical locations to identify global attack risks.

See Also: Gartner Guide for Digital Forensics and Incident Response

The quantity of attacks remains one of the biggest challenges, Daigle says. "We've been watching the evolution of the Mirai botnet over the course of the last few years and seeing that it's not slowing down - it's mutating."

"Things are just slowly evolving," she says. "Old versions sort of fade away, and new ones take over."

In a video interview with Information Security Media Group, Daigle discusses:

  • Findings from GCA's IoT research projects;
  • How threats to IoT devices and technologies are evolving;
  • Strategies to protect networks and devices, including no-fault passwords and software updates.

Daigle has been working at the intersection of technology, business/economics and policy for more than 20 years to drive effective change. As CTO at the Global Cyber Alliance, a not-for-profit organization dedicated to reducing cyber risk, she is responsible for the technology strategy that advances GCA’s development and deployment of global solutions. Daigle was previously the Internet Society’s first chief internet technology officer.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.