IoTSF Amsterdam: Why IoT mandates Zero Tolerance
This talk discusses the need for a comprehensive security framework based on Zero Tolerance principles, promoting pro active controls that protect the IoT ecosystem across its entire supply chain.
This talk discusses the need for a comprehensive security framework based on Zero Tolerance principles, promoting pro active controls that protect the IoT ecosystem across its entire supply chain.
The IoT Security Foundation (IoTSF) Annual Conference remains an unmissable event for professionals across the industry. This year marked the 10th Annual Conference, held on 23rd October at the IET in London.
The rise of the Internet of Things (IoT) has transformed how we interact with technology in our daily lives. However, with the increasing number of connected devices comes a pressing need for robust cybersecurity measures.
How do I know if your device is trusted? What do we mean by trusted? .. and how do I provide you/your device with the network credentials to access my network in the most secure manner? A new new NIST special publication on IOT networking is trying to address these issues
The Cyber Resilience Act (CRA) represents a significant step forward in enhancing cybersecurity for products with digital elements across the European Union. This regulation aims to improve security standards and accountability in the manufacturing of hardware and software, ensuring that they are less vulnerable to cyber threats.
Traditional methods of generating randosm numbers are starting to show their limits...with the increased sophistication of cybersecurity threats and the rise of advanced technologies like AI and quantum computing, the stakes are higher than ever.
We all know how IoT has revolutionised the way businesses operate. By enabling interconnected devices to collect, share, and act on data, IoT has delivered vast improvements in efficiency, innovation, and customer experiences. However, with this transformative potential comes an equally substantial challenge: security.
The volume of cyberattacks continues to rise at an alarming rate. As the threat landscape grows more complex, a critical question persists: How secure is secure enough? Many companies claim high level security through security evaluation certificates, yet the secure designs remain hidden.
Stephan Janouch - Technical Marketing Director, EMEA, Green Hills Software - will present '10 rules to build unsecure embedded systems' at the 2024 IoTSF conference at London's IET on Wednesday 23rd October.