Human creativity gives us the upper hand against sophisticated cybersecurity attacks

Date Published: July, 01, 2019

By Steve Hanna, Co-chair of the Trusted Computing Group’s Embedded Systems Work Group

The Internet of Things (IoT) is one of many technological advantages that is changing society as we know it, bringing with it benefits of greater efficiency and convenience. But it is important that we also remember the substantial risk that increased connectivity brings.

The IoT is not something that can be secured with a one-size-fits-all approach, every single connected device must be assessed individually. This requires the most creative minds of skilled human security experts working together. Artificial Intelligence (AI) has an important role to play but will not be able to succeed alone.

There is widespread talk of a cyberskills gap, but this is a promising time for cybersecurity. It is one of the fastest-growing employment opportunities with growing salaries to match. To ensure the industry is prepared to protect the estimated 50 billion IoT connected devices that will be active by 2020, we must continue to inspire and encourage the next generation to get involved in cybersecurity.

A smarter future
Attacks are now more sophisticated than ever, online fraud and other cyber-attacks no longer something that people do to be ‘cool’ or participate in on a low-level scale, it is big money-making business that we need to know about and make people aware of. Technology has the power to completely revolutionize society, but we must not shy away from highlighting the risks. It is vital that people are on guard against the fraud that happens in the cyberspace as well as in real space.

The world is getting smarter. Smart cities, autonomous vehicles and smart factories are just three examples of how society is becoming more connected. While these trends undeniably open exciting opportunities for greater efficiency, customization and convenience, they are also becoming prime targets for attackers to infect and hijack.

IoT device protection requires creative and rapid action and AI alone cannot identify attacks, develop counter strikes and build defenses. Cybersecurity experts are needed to fight the constant battle between the attacked and the defenders.

Work with us
TCG is working to create technologies and standards that make computing and smart systems trustworthy and self-healing, but there is still progress to be made. We are currently working closely with academia to identify the next developments in cybersecurity that are able to anticipate and forestall the newest threats that are emerging. There is no quick solution. Rather, this takes time and the knowledge of skilled experts.

We want to deliver trustworthy systems in a way that is easily accessible, which is reflected in our passion about encouraging the next generation to get involved in cybersecurity.

For young people seeking an exciting career, cybersecurity is a great option to consider. TCG and our members have opportunities available. TCG invites professors or graduates with an interest in cybersecurity and trusting computing to get in touch by emailing [email protected] to find out more about research opportunities and gratis liaison membership.

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.