Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

IoT

Navigating SBOM: What Are The Implications for Device Manufacturers and Healthcare Providers

In an increasingly interconnected world, the Internet of Things (IoT) has become a significant driver of innovation across various industries. Healthcare institutions were early adopters of IoT technology, leveraging it to improve patient care, streamline operations, and enhance data management. However, this surge in IoT adoption brings with it new challenges, one of which is the need for more transparency and security in the supply chain of connected medical devices.

The Evolution of IoT Cybersecurity: A 20-Year Journey

Each October, Cybersecurity Awareness Month encourages individuals and organizations to prioritize cybersecurity. This initiative has played a vital role in raising awareness about IoT security and promoting responsible IoT device usage. 2023 marks the 20th anniversary of Cybersecurity Awareness Month, and it seems like the perfect time to reflect on the ever-evolving landscape of IoT (Internet of Things) cybersecurity over the past two decades.

The Best IoT Solutions to Revolutionise Your Business in 2023

Ready to revolutionise your business with the power of IoT? As the digital world advances, IoT solutions bring countless possibilities to transform industries, streamline processes, and enhance customer experiences. Let’s dive into the world of IoT and explore how it can revolutionise your business, in 2023 and beyond!

Fortifying IoT Devices: Unraveling the Art of Securing Embedded Systems

Interconnected, data-enabled devices are more common now than ever before. By 2027, it is predicted that there will be more than 41 billion new IoT devices. The emergence of each new device offers a fresh vulnerability point for opportunistic bad actors. In 2022, there were over 112 million cyberattacks carried out on IoT devices worldwide. Without sufficient protection, attackers can exploit these weak points to gain access to sensitive data or restrict access to internet networks.

Automotive Industry stalling ahead of 2024's new vehicle safety regulations

With the United Nations Economic Commission for Europe World Forum for Harmonisation of Vehicle Regulations (UNECE WP.29) framework coming into effect in July 2024, leaders across the Automotive sector are apparently ‘swamped’ by the volume of compliance and security risks that need to be addressed to protect drivers in all types of connected or autonomous vehicles.

R4IoT: When Ransomware Meets the Internet of Things

Originally published June 1, 2022 In mid-2022, Forescout Research – Vedere Labs developed R4IoT, a proof-of-concept that showed how IoT devices could become entry points for IT and further OT ransomware attacks. The original blog post, below, explains how we came to create R4IoT and why. Our 2023H1 Threat Review included ample evidence that cross-device attacks like R4IoT are now a reality.

The world needs start-ups to meet IoT security challenges

I read this article earlier this week from Jeff Vance and I was buoyed by the refreshing reflection of reality – Jeff really hits the nail on the head. As the CEO of a cyber security start up, we see, hear, and feel these points daily and the fact is that so many larger security or network businesses claim to solve problems that they cannot. Not only is this doing a disservice to customers but to the wider security landscape. Let’s explore this further…

Defensics extends fuzzing capabilities for IoT markets

Internet of Things (IoT) devices are becoming ubiquitous, with billions deployed in the world. And threat actors are constantly looking for vulnerabilities in them because, unlike traditional IT devices, once IoT devices with fixed firmware are deployed, it is often impossible to fix problems. That’s why it is critical to thoroughly test the security and resilience of IoT devices before deployment, using the same methods that hackers use.

A Comprehensive Guide to Identity Access Management (IAM)

Secure your digital landscape and maintain compliance with regulations by embracing an Identity Access Management (IAM) system. In this guide, you will learn the significance of IAM, its key components as well as how to implement it in your organisation and manage access to identity management solutions more effectively – securing sensitive data from unauthorised personnel so that employees can easily gain access to all necessary tools for their job roles.

Security Issues of IoT: Securing Your IoT Device in 2023

The Internet of Things (IoT) has made a huge impact on our lives, connecting homes, workplaces and cities in ways that was once only seen as futuristic. But this connectedness comes with its own set of security challenges which need to be addressed. Are we doing enough to protect ourselves from potential security vulnerabilities now?