We are looking forward to welcoming you to the IoTSF Annual conference on October 5th In our last blog we highlighted the morning sessions on offer. This time we look into the afternoon tracks. After the chance to meet some friends over lunch and make contact with colleagues we sit down
An Initial Look A European proposal for a regulation that 'bolsters cybersecurity rules to ensure more secure hardware and software products' within European Union internal markets has been published (Sept 15th). The Eu Cyber Resilience Act (CRA) - or 'horizontal cybersecurity requirements for products with digital elements and amending Regulation', is the current culmination of a
We are looking forward to welcoming you to the IoTSF Annual Conference on October 5th But what can you expect? On offer this year are leading speakers from across the IoT Security field and great opportunities to meet people from across the sector during the day, at the drinks reception and the networking
The IoTSF conference is the longest running event focused on IoT security and without question attracts the best speakers and key stakeholders on the subject from across the globe. This year is no exception with leaders from Governments, large organisations, SMEs, and vendor solutions to manage the IoT security risk. All play
The Internet of Things Security Foundation (IoTSF) ManySecured Special Interest Group (SIG) is working to outline high level solutions to a design flaw/problem that affects millions of IoT devices and standard Internet routers. We are also encouraging the development of working prototypes of potential solutions that can be tested for scale and usability. February
When it comes to IoT attacks and malware, there is a perceptible pattern in which most intrusions manifest. It is good practice to study such patterns and draw conclusions so that we may extrapolate to future attacks.
November 4th, 2021: New Report on Industry Adoption of Vulnerability Disclosure Practice Published. The IoT Security Foundation has published its 4th report which examines the practice of vulnerability disclosure in Consumer IoT - with an extension into enterprise and the B2B model. The report is seen as a cybersecurity progress barometer of the sector
When directed to manage an IoT device or router using a browser, passwords and all communications are typically passed over an unencrypted connection. This is a security vulnerability which needs attention.
The IoT landscape is notoriously under-secured. In the rush to meet demand for online products, services and infrastructure, many manufacturers have adopted a ‘connect first, think later’ strategy where security has been an afterthought. This has resulted in years of serious security and privacy breaches.
This is a guest blog authored by Eric Greenwald, General Counsel at Finite State, and Matt Wyckhouse, Founder and CEO at Finite State.