IoT Thames Valley Virtual Meetup

Tags: , , , , , , |

A detailed look at IoT attack vectors in the home Nick Allott, CEO of nquiringminds will be giving a talk: "A detailed look at IoT attack vectors in the home" at the IoT Thames Valley Virtual Meetup on 16th September. Nick's presentation will be based upon work undertaken with the University of Oxford as part

Informa IoT Security Summit Virtual Conference

Tags: , , , , |

With the impact of COVID-19, cybersecurity risks have been heightened in the sudden turn of unexpected events. IoT Security Summit Virtual will help you ensure your security is robust against disruption, measuring your IoT progress with the right security framework. Learn from security experts on how to keep your community secure by improving the safety and reliability of

IoT Security Home Architecture and Policy Whitepaper Announced

Tags: , , , , , |

The hub-based approach puts onus on OEMs and router manufacturers Release Date: 15th November, 2018 The IoT Security Foundation (IoTSF) announces today, a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the home. Entitled: IoT Security Architecture and Policy for the Home

Enterprise IoT Security Architecture and Policy Whitepaper Announced

Tags: , , , , , , |

The hub-based approach provides a user-friendly centralised management solution Release Date: 15th November, 2018 The IoT Security Foundation (IoTSF) announces today a new whitepaper that outlines the benefits that accrue by taking a hub-based approach to connecting IoT devices and systems in the enterprise. Entitled: IoT Security Architecture and Policy for the Enterprise -

Escaping Dark Age Cybersecurity Thinking

Tags: , , , , |

This article by Jim Burrows - currently researching Machine Ethics. Prev: Eng. VP at Silent Circle - was originally posted on here. You can read more articles by Jim here. Much of what’s wrong today in the realm of security, especially “cybersecurity” comes from thinking that is rooted in the Dark Ages. “Motte and Bailey” Thinking There

Securing the Internet of Things – Part 3

Tags: , , , , , |

This article by Calum McClelland - Director of Business Development at Leverege - was originally posted on IoT For All. You can find Calum on Medium, Twitter, and LinkedIn. In Securing the Internet of Things Pt. 1, we saw that security is an absolutely critical component of any IoT system. Without proper security, vulnerable devices can

How the IoT industry will self-regulate its security

Tags: , , , , , |

Ben Dickson shares his thoughts in this blog which was originally posted here on Tech Talks Blog. Following last week’s DDoS attack against Dyn, which was carried out through a huge IoT botnet, there’s a general sense of worry about IoT security—or rather insecurity—destabilizing the internet or bringing it to a total collapse. All sorts of apocalyptic

Is Your Enterprise Security Insured?

Tags: , , , , |

In 2012, the World Economic Forum published a research report titled “The future of manufacturing: opportunities to drive economic growth [ref 1]. The development and adoption of the Internet of Things (IoT) is a critical element of smarter manufacturing. The next wave of manufacturing with IoT enabled systems is referred to Industrie 4.0, which

Is the Tesla Model S robust against hackers?

Tags: , , , , , , , |

In his talk "What I learned about IoT from hacking the Tesla Model S" given at the IoT Security Foundation's inaugural conference (Royal Society, London, Dec '15), Marc Rogers outlined how he managed to hack into the electronic systems of the iconic $90,000 car.   Yet despite finding a number of significant vulnerabilities, Marc not