Today, there are a number of regulations designed to secure the use of connected objects. Until now, IoT has not been secure from the moment it was produced, creating security weaknesses and therefore concerns about its development. But those days are soon to be over. A European regulation for cybersecurity in IoT andEdge Computing is about to be adopted. But what is it? What's the point? We explain.

The cybersecurity regulation in IoT that could change everything

Today's society is increasingly fond of new technologies, with a particular exaltation for connected objects. But the market is unfortunately not as controlled as it should be.as it should be, and this in various fields of activity. But unfortunately, the market is not as controlled as it should be, and this in various fields of activity.

The IoT sector is no exception. In search ofcost savingss, professionals and individuals alike are favoring the consumption of American or Chinese equipment. Lwhere costs are but where the transparency of the manufacturing process is rather opaque. Because of this lack of visibility, consumers have no control and are therefore subject to major risks.

Once adopted, the Cyber Resilience Act, or European regulation for cyber resilience in the IoT, will have a major impact on the entire IT value chain, from artificial intelligence to machine learning to robotization or automation. This regulation will also help companies and organizations to opt for for Edge Computing.

The IoT value chain soon to be fully secure thanks to cybersecurity regulations for connected objects

"The IoT value chain consists of five layers: the connected object itself, the communication protocol, storage, associated services and business process integration."explains Frédéric Jourdain, Business Developer à Blue Soft Belgium.

To date, security in the use of a connected object is subject to numerous regulations. However, reliable security in the use of a connected object is only guaranteed once these five "layers" have been secured. And despite a multitude of rules defined to ensure security in the use of a connected object, no regulation currently governs the design and production of connected objects.

But once in effect, these IOT cybersecurity regulations will strengthen security and accelerate the development of large-scale projects that are currently slow. Also, in light of current energy issues, the additional security provided by the IOT cybersecurity regulation will help accelerate the development of large-scale projects that are currently slow.ith today's energy issues, the additional security provided by IoT and Edge Computing regulations will only improve resource management. "Industry and grid operators are major consumers of IoT. As such, their security is very dependent on regulations that protect users."Frédérique Jourdain defends. Because of the benefits it brings, Edge Computing is becoming unavoidable.

Edge Computing, a soon-to-be-inevitable essential

There are a number of major advantages to adopting Edge Computing and IoT:

  • This technology is capable of managing thousands of connected objects. In some cases, it replaces Cloud for meticulous management of a large number of objects simultaneously.
  • In order to reduce energy consumption and in the face of a considerable volume of data, Edge Computing filters and retains relevant data rather than storing all the information, as is currently the case with Cloud.
  • The encryption of the data is done at the Edge and will secure its circulation
  • One of the major benefits of Edge Computing will be the be the reduction latency on data processing time

For all these reasons, Edge Consulting will quickly become a must-have technology. And it is also why it is necessary to set up a European regulation to secure this technology and improve the cybersecurity of IOT.

See also our article explaining how 5G will explode the IOT world.

Share this article!