Router and IoT Vulnerabilities: Insecure by Design

Tags: , , , , , , , , , , , , , , , |

When directed to manage an IoT device or router using a browser, passwords and all communications are typically passed over an unencrypted connection. This is a security vulnerability which needs attention.

TREs and the IoT – Enabling a Trusted Connected Future

Tags: , , , , , , |

The IoT landscape is notoriously under-secured. In the rush to meet demand for online products, services and infrastructure, many manufacturers have adopted a ‘connect first, think later’ strategy where security has been an afterthought. This has resulted in years of serious security and privacy breaches.

President Biden’s Executive Order on Improving U.S. Cybersecurity

Tags: , , , , , , , , |

This is a guest blog authored by Eric Greenwald, General Counsel at Finite State, and Matt Wyckhouse, Founder and CEO at Finite State.

UK Government Update on Plans for Consumer IoT Security Regulation

Tags: , , , , , , , , , , , |

Today, UK's Department for Digital, Culture, Media and Sport (DCMS) published its response to the Secure by Design call for views in its quest to change the law to make ‘smart’ products - like televisions, cameras and household appliances that connect to the Internet - more secure for consumers to use.

Expanding the view of consumer vulnerability disclosure practice

Tags: , , , |

Now in its third year, IoTSF's latest research report on Consumer Vulnerability Disclosure continues to shine a light on the poor performance of industry on the basic practice of vulnerability disclosure. Whilst incremental gains have been made, they are small and not worthy of celebration.

Article | Telemedicine, Remote Patient Monitoring, IoT, and Patient Data Security

Tags: , , , , |

With the numerous advancements in technology today, we now have capabilities that, just a few decades ago, would have likely been thought impossible. It’s easier than ever to access the internet, video chat, call, and text from almost anywhere.

COVID-19 Crisis: Cyber Security Advice for Building Owners and Facilities Managers

Tags: , , , , , , , |

The IoT Security Foundation and Institute of Workplace and Facilities Management offer guidance on securing Building Management Systems and Internet of Things systems.

Network Information Security & Distributed Ledger Technology

Tags: , , , , , |

By Jon Geater, CTO of Jitsuin, you can read the original article here The European Union NIS Directive represents a necessary step toward securing Critical National Infrastructure (CNI) and encouraging best practice to protect essential services. Yet there are many challenges to overcome in the next few short years before regulatory

IoT Security Foundation Opens Applications for the IoTSF Champion Award

Tags: , , , , , , , , , , , , |

The IoT Security Foundation is pleased to announce the IoT Security Champion Award is now open for applications. Now in its second year, the award seeks to identify and celebrate organisations which demonstrate good IoT security stewardship as part of the IoTSF mission to raise security standards and drive best practice

David Rogers awarded MBE in the Queen’s Birthday Honours list 2019 for services to cyber security

Tags: , , , |

Copper Horse, a mobile and IoT security company, today announced that its CEO David Rogers, has been awarded an MBE in recognition of his services to cyber security, in The Queen’s Birthday Honours List 2019.