Escaping Dark Age Cybersecurity Thinking

Tags: , , , , |

This article by Jim Burrows - currently researching Machine Ethics. Prev: Eng. VP at Silent Circle - was originally posted on here. You can read more articles by Jim here. Much of what’s wrong today in the realm of security, especially “cybersecurity” comes from thinking that is rooted in the Dark Ages. “Motte and Bailey” Thinking There

Securing the Internet of Things – Part 3

Tags: , , , , , |

This article by Calum McClelland - Director of Business Development at Leverege - was originally posted on IoT For All. You can find Calum on Medium, Twitter, and LinkedIn. In Securing the Internet of Things Pt. 1, we saw that security is an absolutely critical component of any IoT system. Without proper security, vulnerable devices can

Securing the Internet of Things – Part 2

Tags: , |

This article by Calum McClelland - Director of Business Development at Leverege - was originally posted on IoT For All. You can find Calum on Medium, Twitter, and LinkedIn. Why is security such an issue for IoT? What are the barriers to addressing these issues? #askIoT In Securing the Internet of Things Pt. 1, we saw

Securing the Internet of Things – Part 1

Tags: , , , , |

This article by Calum McClelland - Director of Business Development at Leverege - was originally posted on IoT For All. You can find Calum on Medium, Twitter, and LinkedIn. Security Needs to Fit Everywhere in IoT To date, security hasn’t been a priority in the Internet of Things. Instead of being viewed as an integral part of

Case Study: IoT and Security – Who Needs Either?

Recently, I had the pleasure of speaking to Damon Hart-Davis, CEO of OpenTRV. Damon is on a quest to reduce heating waste and in so doing “cutting carbon for everyone”. That is noble in itself, however, that was not the main purpose of the conversation. Damon is making use of communications technology to deliver his mission and that brings his product into the realm of IoT. I was naturally interested to hear his views on security and heartened by what he told me. His method is consistent with the founding values of IoTSF....

How to Protect Connected Home Devices and Appliances from Cyber Attacks

Tags: , , , , |

By David West, Engineering Director of Icon Labs. The original article can be seen here. In July of 2014, HP Labs did a study of 10 popular IoT devices and found security was shockingly bad. The researchers studied 10 devices, looking at end-to-end security capabilities including privacy protection, authorization, encryption, user interface protection, and

IoT Security for Connected Surveillance Cameras

Tags: , , , , , , |

This blog by Robert Dobson was originally posted on Device Authority website. The IoT is expanding at a rapid rate and is expected to grow over the coming years at a pace which makes previous technology adoptions look insignificant. Predictions are that by 2020 there will be some +20 Billion connected devices worldwide. The IoT

What Bruce Schneier teaches us about IoT and cybersecurity

Ben Dickson shares his thoughts in this blog which was originally posted here on Tech Talks Blog. As if I haven’t said it a million times, IoT security is critical. But just when I thought I had it all figured out, somebody comes along and sheds new light on this very important topic in a different way.

How the IoT industry will self-regulate its security

Tags: , , , , , |

Ben Dickson shares his thoughts in this blog which was originally posted here on Tech Talks Blog. Following last week’s DDoS attack against Dyn, which was carried out through a huge IoT botnet, there’s a general sense of worry about IoT security—or rather insecurity—destabilizing the internet or bringing it to a total collapse. All sorts of apocalyptic