• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • DroneRacingLife
  • DroneFlyers
  • Newsletter
DroneLife

DRONELIFE

Stay up to date on all the latest Drone News

  • News
  • Products
  • Industries
    • Agriculture
    • Construction
    • Delivery
    • Dual Use
    • Inspection
    • Public Safety
    • Surveying
  • Enthusiasts
  • Regulations
  • Business
  • Video
  • Podcasts

Zero Trust Takes Flight: SpiderOak’s Cybersecurity Platform Shields Drone Data from Spoofing and Theft

April 8, 2025 by Miriam McNabb Leave a Comment

SpiderOak provides zero-trust solutions to protect drone data

By DRONELIFE Features Editor Jim Magill

As the number of UAVs flown for a wide variety of purposes grows, drone fleet operators are becoming increasingly concerned over the need to protect their data from malicious actors who might want to steal it, as well as protecting their fleets from spoofing or jamming attacks.

A U.S.-based data software company, which has developed a zero-trust system to ensure the security of satellite transmissions, now is offering a similar blanket of protection for data sent to and collected by drones.

“We have basically created a developmental platform for people that build software systems for drones or satellites, or really any embedded application or application that you might find in a data center,” Kip Gering, chief revenue officer for SpiderOak, said in an interview.

“This development platform allows the developers to say that for every message that they send out, that digital interaction will be authenticated and authorized by the applications that are receiving them,” he said. This differs from the traditional way of protecting the security of data, by means of relying on network security controls that are typically deployed in IT-based systems.

SpiderOak’s technology is based on the principle of zero trust. “Zero trust is a framework for adopting cybersecurity principles and best practices that fundamentally come down to ‘Never trust, always verify,’” Gering said.

Prior to the introduction of zero trust, most cyber-security principles were based on controlling access to a communications network at the network’s perimeter. “But as more devices get connected, and interactions are happening within those networks, communication may go from one network to the next network,” he said.

The guiding principle of zero trust is, “Always identify yourself, always request access and request permission for any type of interaction to occur,” Gering said. “Then build out the infrastructure to ensure that when things –whether it’s an application, a computer, a device or a sensor — request permission to share information or to communicate with each other, there’s the infrastructure there that is basically ensuring that those digital interactions can be trusted regardless of where they exist on the network.”

For the developers of drone networks used in commercial or defense applications, SpiderOak has created a development platform that “allows the developers to say for every message that they send out, that digital interaction will be authenticated and authorized by the applications that are receiving them.”

Kamrul Hasan, an assistant professor and director of the cybersecurity lab in Tennessee State University, said zero trust is based on a device’s identity as well as on authentication. So, in a case where both drones and a system’s ground station have been identified, “You have to implement a mutual authentication,” before any data transfers can take place, he said.

“The zero-trust security model assumes that no user, device or system is tested by default, even if inside the network perimeter. So, every action requires continuous verification,” said Hasan.

This system of data security protection is particularly useful for military drones, which often operate in hostile and uncontrolled environments, disconnected from radio control signals. Normally such drones are vulnerable to spoofing attacks and command signal hijacking, Hasan said. “So, if you look into those attack patterns and if you want to get solid or concrete, holistic solutions to protect from those types of attack, in that case you have to think about zero trust.”

Gering said zero-trust solutions also are expected to become more important to operators of commercial drone fleets as the FAA gets ready to implement a sweeping BVLOS rule, opening up much of the U.S. airspace to UAV traffic.

“With this ruling around BVLOS, we see an opportunity — just like we see with driverless vehicles and connected vehicles — where, for safety purposes, you may want to share information of a drone that’s in flight with other sensors and other infrastructure that may be in the proximity,” he said.

“We think that that ruling will bring about the need for more edge interactions, or interactions between infrastructure and drones, and maybe even between drones themselves,” Gering said. “And that presents its own challenge, because then you’ve got this peer-to-peer type of interaction where you need to make sure that messages are transmitted securely.”

SpiderOak’s zero-trust architecture allows this type of communication, without relying on the use of a central server, he said. “We provide you with the ability to calculate those policies and enforce the security around those digital interactions locally on board the drones and between drones and infrastructure that may be on the ground for safety or navigation purposes.”

Gering said that employing SpiderOak’s zero-trust system can even ensure that data collected by an operator’s drone will stay under the operator’s control, despite the drone’s country of origin. This potentially could prove to be an important tool for American companies that operate fleets of drones produced by Chinese manufacturers such as DJI or Autel, who nevertheless want to keep their data from traveling outside the country.

“We are a fully owned U.S. company. All of our employees are U.S. citizens, and we’ve done a lot of work with the DOD [U.S. Department of Defense]. So, we’re, we’re pretty solid from that perspective,” he said.

“If I did have a mix of Chinese and U.S. drones, I could have a consistent security architecture across those drones, and I could change what the Chinese drones were allowed to do and allowed to see versus what the U.S.-manufactured drones would be allowed to see,” he said. “So, we’re not dependent on the hardware, which would have been manufactured in China, for the security controls.

Want DRONELIFE news delivered to your inbox every weekday?  Sign up here.

Read more:

  • Exclusive Interview: DJI Officials Defend Data Security Policies Amid Chinese Drone Ban Concerns
  • Controversy Surrounding Data Security of Chinese-made Drones Sparks Intense Debate
  • Do Drone Users Really Care About Data Security? What the Survey Numbers Say

Jim Magill is a Houston-based writer with almost a quarter-century of experience covering technical and economic developments in the oil and gas industry. After retiring in December 2019 as a senior editor with S&P Global Platts, Jim began writing about emerging technologies, such as artificial intelligence, robots and drones, and the ways in which they’re contributing to our society. In addition to DroneLife, Jim is a contributor to Forbes.com and his work has appeared in the Houston Chronicle, U.S. News & World Report, and Unmanned Systems, a publication of the Association for Unmanned Vehicle Systems International.

 

Miriam McNabb

Miriam McNabb is the Editor-in-Chief of DRONELIFE and CEO of JobForDrones, a professional drone services marketplace, and a fascinated observer of the emerging drone industry and the regulatory environment for drones. Miriam has penned over 3,000 articles focused on the commercial drone space and is an international speaker and recognized figure in the industry.  Miriam has a degree from the University of Chicago and over 20 years of experience in high tech sales and marketing for new technologies.
For drone industry consulting or writing, Email Miriam.

TWITTER:@spaldingbarker

Subscribe to DroneLife here.

Filed Under: Drone News, Drone News Feeds, Drones in the News, News Tagged With: BVLOS security, drone communications, drone cybersecurity, drone data protection, drone fleet protection, jamming protection, SpiderOak, spoofing prevention, UAV security, zero trust

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

LATEST

Elsight’s Halo Platform Advances in DIU Project G.I. Prize Challenge

Elsight has been officially selected by the U.S. Defense Innovation Unit (DIU) to proceed to Phase 3 of Project G.I.,…

Continue Reading Elsight’s Halo Platform Advances in DIU Project G.I. Prize Challenge

Planet Labs and Quantum Systems Partner to Integrate Satellite and Drone Intelligence

Planet Labs GmbH and Quantum Systems have announced a strategic partnership to create an integrated intelligence ecosystem combining orbital satellite…

Continue Reading Planet Labs and Quantum Systems Partner to Integrate Satellite and Drone Intelligence

How AI Is Pushing Industrial Drone Use Into a New Era

AI tools set to trigger rapid industry adoption of drones By DRONELIFE Features Editor Jim Magill Although over the past…

Continue Reading How AI Is Pushing Industrial Drone Use Into a New Era

UAVOS Demonstrates New Swarm-Control with UAS Borey Formation

https://www.youtube.com/watch?v=GG6Ld0zKDKw UAVOS has successfully completed a series of group flight tests showcasing its swarm-control autopilot module integrated into fixed-wing Borey…

Continue Reading UAVOS Demonstrates New Swarm-Control with UAS Borey Formation

Palladyne AI Forms New Defense Division Through Strategic Acquisitions

Palladyne Defense integrates embodied AI, avionics, and U.S. manufacturing to support modernization priorities Palladyne AI has announced a major shift…

Continue Reading Palladyne AI Forms New Defense Division Through Strategic Acquisitions

The New Front Line: How Autonomous C-UAS Is Transforming Battlefield Defense

Autonomous counter-UAS has become one of the most urgent topics in modern defense, as rapidly evolving drone tactics outpace traditional…

Continue Reading The New Front Line: How Autonomous C-UAS Is Transforming Battlefield Defense

Europe “Not Ready” for Drone Warfare: Kubilius Warns at Defending Baltics 2025

At a major security conference in Vilnius, the EU’s Defence Commissioner says Europe must scale drone and counter-drone systems fast…

Continue Reading Europe “Not Ready” for Drone Warfare: Kubilius Warns at Defending Baltics 2025

Senator Moody Seeks Inclusion of “Drone Espionage Act” in FY 2026 NDAA

Proposal aims to update federal law to address video-based surveillance of U.S. defense sites Senator Ashley Moody has asked congressional…

Continue Reading Senator Moody Seeks Inclusion of “Drone Espionage Act” in FY 2026 NDAA

U.S. Air Force Awards Skydio Contracts to Expand Advanced Autonomy Across Mission-Critical Units

New awards follow a surge in UAS procurement across the U.S. military The U.S. Air Force has awarded Skydio two…

Continue Reading U.S. Air Force Awards Skydio Contracts to Expand Advanced Autonomy Across Mission-Critical Units

SkySafe Introduces New Forensics Service to Strengthen Drone Incident Investigations

SkySafe offers Forensics as a Service to aid investigations of drone incidents By DRONELIFE Features Editor Jim Magill As police…

Continue Reading SkySafe Introduces New Forensics Service to Strengthen Drone Incident Investigations

Secondary Sidebar

Footer

SPONSORED

Inspired Flight Gremsy IF800 VIO F1 drones geo week

What Will It Take to Strengthen U.S. Drone Manufacturing? A Conversation with Inspired Flight’s CEO

Global Mapper Mobile data collection

Collection Ground Control Points with Global Mapper Mobile

Military Drone Mapping Solutions

How SimActive’s Correlator3D™ is Revolutionizing Military Mapping: An Exclusive Interview with CEO Philippe Simard

Photogrammetry Accuracy Standards

SimActive Photogrammetry Software: Enabling Users to Meet Accuracy Standards for Over 20 Years

NACT Engineering Parrot ANAFI tether indoor shot

Smart Tether for Parrot ANAFI USA from NACT Engineering

Blue Marble, features global mapper, features Blue Marble

Check Out These New Features in Global Mapper v25 from Blue Marble

About Us | Contact Us | Advertise With Us | Write for Us | Privacy Policy | Terms of Service

The Trusted Source for the Business of Drones.

This website uses cookies and third party services. By clicking OK, you are agreeing to our privacy policy. ACCEPT

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT