Remove Computers and Electronics Remove Firmware Remove IoT Remove Risk
article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Use cases of secure IoT deployment. In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Tue, 06/01/2021 - 06:55. Use case 1: Fortune 500 Healthcare Company.

IoT 71
article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. has made some strides on IoT security at the federal level; it remains to be seen if the EU initiative will spur the U.S. IoT market growth. IoT Security Neglected.

Wireless 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? The problem becomes – how do we make sure we’re securing these “driving data centers” against the risks and threats that lurk on the Internet? First off, connected vehicles and IoT devices are highly attractive targets to hackers. Guest Blog: TalkingTrust. Thu, 03/11/2021 - 07:39.

IoT 77
article thumbnail

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

eSecurity Planet

Hackers can exploit these weaknesses to compromise computer systems, exfiltrate data, and even perform DDoS attacks. CWE-1240 : Use of a Cryptographic Primitive with a Risky Implementation – non-standard cryptographic implementation is pretty hard to fix and puts the whole system at risk. The full MITRE-CWE list.

Software 109
article thumbnail

The Internet of Things: Security Risks Concerns

Spinone

The Internet of Things (IoT) is a term used to describe the network of interconnected electronic devices with “smart” technology. The Security Risks of IoT Devices Every piece of hardware and software that you use and is connected to the internet has the potential to be accessed by cybercriminals.

article thumbnail

IoT Secure Development Guide

Pen Test Partners

IoT Design Frameworks 2.2. Threat modeling can be applied to a wide range of things, including software, applications, systems, networks, distributed systems, Internet of Things (IoT) devices, and business processes. Deploy malicious firmware. Table of contents 1. Threat Modelling 1.1. Why threat modelling is important 1.2.

IoT 52