article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. has made some strides on IoT security at the federal level; it remains to be seen if the EU initiative will spur the U.S. IoT market growth. IoT Security Neglected.

Wireless 107
article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Here we’ll discuss the most significant risks posed by 5G, how U.S. Table of Contents What Are the Cybersecurity Risks of 5G? How is 5G Different?

Risk 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. The same goes with the advent of Quantum Computing , which is supposed to bring exponential computing power that shall not only bring endless benefits but also raises question marks on the current state of cryptography that is the bedrock of all information security as we know today.

article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Use cases of secure IoT deployment. In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Tue, 06/01/2021 - 06:55. Use case 1: Fortune 500 Healthcare Company.

IoT 71
article thumbnail

IoT Secure Development Guide

Pen Test Partners

IoT Design Frameworks 2.2. Threat modeling can be applied to a wide range of things, including software, applications, systems, networks, distributed systems, Internet of Things (IoT) devices, and business processes. Table of contents 1. Threat Modelling 1.1. Why threat modelling is important 1.2. Ten-Step Design Cycle 2. Signing 3.4.

IoT 52
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? The problem becomes – how do we make sure we’re securing these “driving data centers” against the risks and threats that lurk on the Internet? First off, connected vehicles and IoT devices are highly attractive targets to hackers. Guest Blog: TalkingTrust. Thu, 03/11/2021 - 07:39.

IoT 77
article thumbnail

Five Interesting Israeli CyberSecurity Companies

Joseph Steinberg

This list is not in any particular order, nor is it even remotely comprehensive (I am personally aware of well over 100 privately-held Israeli cybersecurity companies) – it is, however, illustrative of some of the areas of risk and of innovation that are presently on my mind. Argus Cyber Security .