• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • DroneRacingLife
  • DroneFlyers
  • Newsletter
DroneLife

DRONELIFE

Stay up to date on all the latest Drone News

  • News
  • Products
  • Industries
    • Agriculture
    • Construction
    • Delivery
    • Dual Use
    • Inspection
    • Public Safety
    • Surveying
  • Enthusiasts
  • Regulations
  • Business
  • Video
  • Podcasts

Zero Trust Takes Flight: SpiderOak’s Cybersecurity Platform Shields Drone Data from Spoofing and Theft

April 8, 2025 by Miriam McNabb Leave a Comment

SpiderOak provides zero-trust solutions to protect drone data

By DRONELIFE Features Editor Jim Magill

As the number of UAVs flown for a wide variety of purposes grows, drone fleet operators are becoming increasingly concerned over the need to protect their data from malicious actors who might want to steal it, as well as protecting their fleets from spoofing or jamming attacks.

A U.S.-based data software company, which has developed a zero-trust system to ensure the security of satellite transmissions, now is offering a similar blanket of protection for data sent to and collected by drones.

“We have basically created a developmental platform for people that build software systems for drones or satellites, or really any embedded application or application that you might find in a data center,” Kip Gering, chief revenue officer for SpiderOak, said in an interview.

“This development platform allows the developers to say that for every message that they send out, that digital interaction will be authenticated and authorized by the applications that are receiving them,” he said. This differs from the traditional way of protecting the security of data, by means of relying on network security controls that are typically deployed in IT-based systems.

SpiderOak’s technology is based on the principle of zero trust. “Zero trust is a framework for adopting cybersecurity principles and best practices that fundamentally come down to ‘Never trust, always verify,’” Gering said.

Prior to the introduction of zero trust, most cyber-security principles were based on controlling access to a communications network at the network’s perimeter. “But as more devices get connected, and interactions are happening within those networks, communication may go from one network to the next network,” he said.

The guiding principle of zero trust is, “Always identify yourself, always request access and request permission for any type of interaction to occur,” Gering said. “Then build out the infrastructure to ensure that when things –whether it’s an application, a computer, a device or a sensor — request permission to share information or to communicate with each other, there’s the infrastructure there that is basically ensuring that those digital interactions can be trusted regardless of where they exist on the network.”

For the developers of drone networks used in commercial or defense applications, SpiderOak has created a development platform that “allows the developers to say for every message that they send out, that digital interaction will be authenticated and authorized by the applications that are receiving them.”

Kamrul Hasan, an assistant professor and director of the cybersecurity lab in Tennessee State University, said zero trust is based on a device’s identity as well as on authentication. So, in a case where both drones and a system’s ground station have been identified, “You have to implement a mutual authentication,” before any data transfers can take place, he said.

“The zero-trust security model assumes that no user, device or system is tested by default, even if inside the network perimeter. So, every action requires continuous verification,” said Hasan.

This system of data security protection is particularly useful for military drones, which often operate in hostile and uncontrolled environments, disconnected from radio control signals. Normally such drones are vulnerable to spoofing attacks and command signal hijacking, Hasan said. “So, if you look into those attack patterns and if you want to get solid or concrete, holistic solutions to protect from those types of attack, in that case you have to think about zero trust.”

Gering said zero-trust solutions also are expected to become more important to operators of commercial drone fleets as the FAA gets ready to implement a sweeping BVLOS rule, opening up much of the U.S. airspace to UAV traffic.

“With this ruling around BVLOS, we see an opportunity — just like we see with driverless vehicles and connected vehicles — where, for safety purposes, you may want to share information of a drone that’s in flight with other sensors and other infrastructure that may be in the proximity,” he said.

“We think that that ruling will bring about the need for more edge interactions, or interactions between infrastructure and drones, and maybe even between drones themselves,” Gering said. “And that presents its own challenge, because then you’ve got this peer-to-peer type of interaction where you need to make sure that messages are transmitted securely.”

SpiderOak’s zero-trust architecture allows this type of communication, without relying on the use of a central server, he said. “We provide you with the ability to calculate those policies and enforce the security around those digital interactions locally on board the drones and between drones and infrastructure that may be on the ground for safety or navigation purposes.”

Gering said that employing SpiderOak’s zero-trust system can even ensure that data collected by an operator’s drone will stay under the operator’s control, despite the drone’s country of origin. This potentially could prove to be an important tool for American companies that operate fleets of drones produced by Chinese manufacturers such as DJI or Autel, who nevertheless want to keep their data from traveling outside the country.

“We are a fully owned U.S. company. All of our employees are U.S. citizens, and we’ve done a lot of work with the DOD [U.S. Department of Defense]. So, we’re, we’re pretty solid from that perspective,” he said.

“If I did have a mix of Chinese and U.S. drones, I could have a consistent security architecture across those drones, and I could change what the Chinese drones were allowed to do and allowed to see versus what the U.S.-manufactured drones would be allowed to see,” he said. “So, we’re not dependent on the hardware, which would have been manufactured in China, for the security controls.

Want DRONELIFE news delivered to your inbox every weekday?  Sign up here.

Read more:

  • Exclusive Interview: DJI Officials Defend Data Security Policies Amid Chinese Drone Ban Concerns
  • Controversy Surrounding Data Security of Chinese-made Drones Sparks Intense Debate
  • Do Drone Users Really Care About Data Security? What the Survey Numbers Say

Jim Magill is a Houston-based writer with almost a quarter-century of experience covering technical and economic developments in the oil and gas industry. After retiring in December 2019 as a senior editor with S&P Global Platts, Jim began writing about emerging technologies, such as artificial intelligence, robots and drones, and the ways in which they’re contributing to our society. In addition to DroneLife, Jim is a contributor to Forbes.com and his work has appeared in the Houston Chronicle, U.S. News & World Report, and Unmanned Systems, a publication of the Association for Unmanned Vehicle Systems International.

 

Miriam McNabb

Miriam McNabb is the Editor-in-Chief of DRONELIFE and CEO of JobForDrones, a professional drone services marketplace, and a fascinated observer of the emerging drone industry and the regulatory environment for drones. Miriam has penned over 3,000 articles focused on the commercial drone space and is an international speaker and recognized figure in the industry.  Miriam has a degree from the University of Chicago and over 20 years of experience in high tech sales and marketing for new technologies.
For drone industry consulting or writing, Email Miriam.

TWITTER:@spaldingbarker

Subscribe to DroneLife here.

Filed Under: Drone News, Drone News Feeds, Drones in the News, News Tagged With: BVLOS security, drone communications, drone cybersecurity, drone data protection, drone fleet protection, jamming protection, SpiderOak, spoofing prevention, UAV security, zero trust

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

LATEST

From Missions to Management: The Shift Defining Public Safety Drone Programs [DRONELIFE Exclusive Interview]

As public safety drone use scales, data, compliance, and coordination define success Public safety drone programs have reached an inflection…

Continue Reading From Missions to Management: The Shift Defining Public Safety Drone Programs [DRONELIFE Exclusive Interview]

Can One Drone Safely Stop Another? Vector and Wrap Think So

Vector teams with Wrap to create killer-drone system By DRONELIFE Features Editor Jim Magill Vector, a Utah-based technology company that…

Continue Reading Can One Drone Safely Stop Another? Vector and Wrap Think So

American Drone Network and BRANDT Partner to Advance Agricultural Drone Spraying

Collaboration focuses on improving application efficiency, product performance, and pilot training American Drone Network (ADN) has announced a new partnership…

Continue Reading American Drone Network and BRANDT Partner to Advance Agricultural Drone Spraying

Honeywell and Odys Aviation Introduce Airborne Layer for Counter-UAS Defense

New system highlights the need for layered protection against evolving drone threats As drone threats continue to evolve, defense strategies…

Continue Reading Honeywell and Odys Aviation Introduce Airborne Layer for Counter-UAS Defense

The Real FCC Drone Debate: Who Controls the Airwaves?

A closer look at how spectrum policy and licensing could determine the future of U.S. drone operations The FCC is…

Continue Reading The Real FCC Drone Debate: Who Controls the Airwaves?

Why Japan’s AAM Roadmap May Be the Most Realistic in the World

A phased, system-wide approach focuses on operations, infrastructure, and public acceptance Japan’s leading AAM provider, SkyDrive, has translated the country’s…

Continue Reading Why Japan’s AAM Roadmap May Be the Most Realistic in the World

DroneShield Opens European Headquarters in Amsterdam Amid Growing Counter-Drone Demand

DroneShield has officially opened its new European headquarters in Amsterdam, The Netherlands. The move strengthens the counter-drone company’s operational presence…

Continue Reading DroneShield Opens European Headquarters in Amsterdam Amid Growing Counter-Drone Demand

Mid-America Transplant Opens 160-Mile Drone Corridor for Organ Donation

Mid-America Transplant has become the first organ procurement organization (OPO) in the United States to use drones for donor blood…

Continue Reading Mid-America Transplant Opens 160-Mile Drone Corridor for Organ Donation

Manna Raises $50M to Expand Drone Delivery Network in the U.S.

Funding supports plans for 40 new bases and continued scaling of suburban UAV delivery operations Manna Air Delivery has announced…

Continue Reading Manna Raises $50M to Expand Drone Delivery Network in the U.S.

Terra Drone Invests in Ukraine-Based Interceptor Drone Company, Launches Terra A1

Partnership aims to scale low-cost defense solutions and expand global unmanned systems capabilities Terra Drone Corporation has announced a strategic…

Continue Reading Terra Drone Invests in Ukraine-Based Interceptor Drone Company, Launches Terra A1

Secondary Sidebar

Footer

SPONSORED

Inspired Flight Gremsy IF800 VIO F1 drones geo week

What Will It Take to Strengthen U.S. Drone Manufacturing? A Conversation with Inspired Flight’s CEO

Global Mapper Mobile data collection

Collection Ground Control Points with Global Mapper Mobile

Military Drone Mapping Solutions

How SimActive’s Correlator3D™ is Revolutionizing Military Mapping: An Exclusive Interview with CEO Philippe Simard

Photogrammetry Accuracy Standards

SimActive Photogrammetry Software: Enabling Users to Meet Accuracy Standards for Over 20 Years

NACT Engineering Parrot ANAFI tether indoor shot

Smart Tether for Parrot ANAFI USA from NACT Engineering

Blue Marble, features global mapper, features Blue Marble

Check Out These New Features in Global Mapper v25 from Blue Marble

About Us | Contact Us | Advertise With Us | Write for Us | Privacy Policy | Terms of Service

The Trusted Source for the Business of Drones.

This website uses cookies and third party services. By clicking OK, you are agreeing to our privacy policy. ACCEPT

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT