Remove Data collection Remove Encryption Remove Firmware Remove IoT
article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time. Now for the big challenge - security. Let's dive into it.

IoT 357
article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Critical Success Factors to Widespread Deployment of IoT. Digital technology and connected IoT devices have proliferated across industries and into our daily lives. Finally, IoT devices are being used extensively in smart vehicles and home appliances to provide enhanced user experiences. Threat vectors on IoT.

IoT 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

Recently, NIST has been taking a closer look at the Internet of Things (IoT), inviting input on practical risks organizations face as they move into the age of connected devices. Put simply, trust is critical to the IoT. There are really four categories of threats introduced into organizations with IoT use.

IoT 98
article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

Invariably, Internet of Things (IoT) strategies form the backbone of those efforts. Enormous quantities of data can be generated by and collected from a wide variety of IoT devices. The diversity of IoT devices and lack of standardisation also poses challenges.

article thumbnail

Preparing for IT/OT convergence: Best practices

CyberSecurity Insiders

initiative , such as industrial IoT, the amount of IT-related equipment can balloon to 40 percent of the OT infrastructure. These often use proprietary network protocols and lack basic security controls like authentication or encryption. • Configuration control that tracks all changes to code, OS & firmware regardless.