Remove Blog Remove Data collection Remove Firmware Remove Internet
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. Back to the bit about risks impacting data collected by IoT devices and back again to CloudPets, Context Security's piece aligned with my own story about kids' CloudPets messages being left exposed to the internet.

IoT 358
article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

Invariably, Internet of Things (IoT) strategies form the backbone of those efforts. Enormous quantities of data can be generated by and collected from a wide variety of IoT devices. Finally, it is difficult to underemphasise the importance of encryption to protect sensitive data collected by IoT devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

There are three major threat vectors that harm IoT deployments: Devices are hijacked by malicious software; Data collected and processed in IoT ecosystems is tampered with and impacts the confidentiality, integrity and availability of the information; and, Weak user and device authentication. Internet Of Things. Data security.

IoT 96
article thumbnail

Security experts disclosed Wyze data leak

Security Affairs

According to Twelve Security , the exposed data includes: User name and email of those who purchased cameras and then connected them to their home 24% of the 2.4 The incident was independently verified by the authors of the blog IPVM that focuses on video surveillance products. on December 26 by a reporter at IPVM.com. .

IoT 64
article thumbnail

Preparing for IT/OT convergence: Best practices

CyberSecurity Insiders

This blog was written by a colleague from Tenable. Meanwhile, OT staff are used to working with legacy technologies, many of which pre-date the internet era. • Configuration control that tracks all changes to code, OS & firmware regardless. What is OT vs. IT? They also don't have event logs or audit trails. .

article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

Recently, NIST has been taking a closer look at the Internet of Things (IoT), inviting input on practical risks organizations face as they move into the age of connected devices. I also encourage you to subscribe to our newsletter to receive the latest data security research, insight from our blogs and other resources.

IoT 97