article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Use cases of secure IoT deployment. In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Tue, 06/01/2021 - 06:55. Use case 1: Fortune 500 Healthcare Company.

IoT 71
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? First off, connected vehicles and IoT devices are highly attractive targets to hackers. Unlike servers and devices running in enterprise networks, IoT devices are typically shipped direct to consumers, without any control over the network or environment they run in. Guest Blog: TalkingTrust.

IoT 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

eSecurity Planet

The unranked list contains 12 entries that categorize data found in hardware programming, design, and architecture. Hackers can exploit these weaknesses to compromise computer systems, exfiltrate data, and even perform DDoS attacks. See our picks for the Top Vulnerability Management Tools. The full MITRE-CWE list.

Software 114
article thumbnail

Security Affairs newsletter Round 181 – News of the week

Security Affairs

Feedify cloud service architecture compromised by MageCart crime gang. Google Android team found high severity flaw in Honeywell Android-based handheld computers. Evolution of threat landscape for IoT devices – H1 2018. Magecart cybercrime group stole customers credit cards from Newegg electronics retailer.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? Once I know I can trace back the construction of a computer board to a certain place, you’ve built a different kind of security challenge for the attacker.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

He directs the strategic use of information technology for the College-Institute and is responsible for both IT and E-Learning departments for a four campus network of 350+ computers distributed across two countries and 10 time zones. He was previously senior manager at Deloitte, focused on IoT and industrial cybersecurity.

article thumbnail

IoT Secure Development Guide

Pen Test Partners

IoT Design Frameworks 2.2. Threat modeling can be applied to a wide range of things, including software, applications, systems, networks, distributed systems, Internet of Things (IoT) devices, and business processes. Table of contents 1. Threat Modelling 1.1. Why threat modelling is important 1.2. Ten-Step Design Cycle 2. Signing 3.4.

IoT 52