When you are directed to manage an IoT device or router using a browser, your password and all communications are typically passed over an unencrypted connection. Whitepaper Published by IoT Security Foundation Release Date: August 04, 2021 The Internet of Things Security Foundation (IoTSF) has published a whitepaper today titled:
With the support of the ManySecured project partners, the IoT Security Foundation has created a Special Interest Group (SIG) to facilitate Interoperable Security through Collaboration with stakeholders in the IoT ecosystem value chain. The aims of the SIG are: Produce Best Practice recommendations in the areas of Gateway Foundations, Secure Comms, Update Management, Network
By Jon Geater, CTO of Jitsuin, you can read the original article here The European Union NIS Directive represents a necessary step toward securing Critical National Infrastructure (CNI) and encouraging best practice to protect essential services. Yet there are many challenges to overcome in the next few short years before regulatory
The IoT Security Foundation is pleased to announce the IoT Security Champion Award is now open for applications. Now in its second year, the award seeks to identify and celebrate organisations which demonstrate good IoT security stewardship as part of the IoTSF mission to raise security standards and drive best practice
The IoT Security Foundation (IoTSF) has published a new, free to download whitepaper today titled: “Can you trust your smart building? Understanding the security issues and why they are important to you”. It is aimed at a broad range of stakeholders that together design, specify, procure, install/integrate, validate, operate and maintain building automation systems (BAS). It is specifically targeted at building owners, facility managers, technology providers, architects and installers.
Deploying IoT securely on healthcare networks: new IoT Security Foundation whitepaper outlines best practice for healthcare IT teams & OEMs
Free whitepaper addresses underlying principles for securely deploying IoT systems on healthcare networks and how to cut risks for patients and their data. The use of IoT systems in healthcare creates significant opportunities for both OEMs and healthcare providers, but the inherent connectivity coupled with their use outside controlled hospital environments adds a risk to both patients and their data – risks that need to be managed.
This article by Jim Burrows - currently researching Machine Ethics. Prev: Eng. VP at Silent Circle - was originally posted on here. You can read more articles by Jim here. Much of what’s wrong today in the realm of security, especially “cybersecurity” comes from thinking that is rooted in the Dark Ages. “Motte and Bailey” Thinking There
This blog has been reproduced by kind permission of ARM - founder members of IoTSF. Whether you know it or not, you are benefiting from ARM technology every hour of the day. ARM is the worlds leading semiconductor intellectual property provider and are at the very heart of our digital world - from phones to storage to automotive