Featured Talk: Hardware-Based Cybersecurity for Connected Vehicles

By |March 12th, 2025|Categories: Blog, Featured Talks|

The Cyber Resilience Act (CRA) is a crucial piece of legislation that aims to strengthen cybersecurity across the European Union. It’s designed to ensure that products with digital elements meet specific security standards, ultimately protecting consumers and businesses alike.

Comments Off on Featured Talk: Hardware-Based Cybersecurity for Connected Vehicles

IoTSF Webinar Series: Cyber Resilience Act CRA compliance tool CRAcoWi

By |March 12th, 2025|Categories: Blog, Featured Webinar|

The Cyber Resilience Act (CRA) is a crucial piece of legislation that aims to strengthen cybersecurity across the European Union. It’s designed to ensure that products with digital elements meet specific security standards, ultimately protecting consumers and businesses alike.

Comments Off on IoTSF Webinar Series: Cyber Resilience Act CRA compliance tool CRAcoWi

IoTSF Bangalore: Shaping the Future of Automotive Security – Standards, Innovations and Next-Gen Architectures

By |March 4th, 2025|Categories: Bangalore Events, News|

We brought together passionate automotive cybersecurity experts and industry leaders to explore the evolving security paradigms for the next generation of vehicles.

Comments Off on IoTSF Bangalore: Shaping the Future of Automotive Security – Standards, Innovations and Next-Gen Architectures

Why Memory Safety Should Be a Top Priority

By |February 12th, 2025|Categories: News, Opinion Piece|Tags: , , , , , , |

"Memory safety is a thing" I've uttered these words increasingly in recent years, often during my opening remarks at the IoTSF Annual Conference and I'll keep saying them until memory safety is not such

Comments Off on Why Memory Safety Should Be a Top Priority

IoTSF Webinar Special: RED Article 3.3 Radio product cybersecurity – CE conformity and the August 2025 deadline

By |February 5th, 2025|Categories: News|

IoTSF Webinar Special: RED Article 3.3 Radio product cybersecurity - CE conformity and the August 2025 deadline Register With citation of EN18031 standard in the EU Official Journal, the routes

Comments Off on IoTSF Webinar Special: RED Article 3.3 Radio product cybersecurity – CE conformity and the August 2025 deadline

Featured Talks: Generation Critical Infrastructure: The Future of IoT and Decentralized Systems

By |February 4th, 2025|Categories: Blog, News|

John Sirianni, CEO of Tropic Square As we dive into the world of Internet of Things (IoT) and decentralized systems, we encounter an evolving landscape that demands innovative security solutions.

Comments Off on Featured Talks: Generation Critical Infrastructure: The Future of IoT and Decentralized Systems

Time to Fix Our Digital Foundations: A New Report on Memory Safety and Secure Networking

By |January 21st, 2025|Categories: Blog, News|

This report is a unique barometer of the progress that is being made in the global consumer IoT market, and in recent times can be compared to commercial products used in an enterprise setting.

Comments Off on Time to Fix Our Digital Foundations: A New Report on Memory Safety and Secure Networking

Featured Talks: Embracing Collaborative Approaches and Comprehensive Frameworks in IoT Security

By |January 14th, 2025|Categories: Blog, Featured Talks|

Darron Antill, CEO, Device Authority The realm of IoT security presents a multitude of challenges and opportunities, particularly as we navigate through an ever-evolving digital landscape. The realm of

Comments Off on Featured Talks: Embracing Collaborative Approaches and Comprehensive Frameworks in IoT Security

ManuSec Europe: Cybersecurity for critical manufacturing summit

By |January 13th, 2025|Categories: News|

You’re invited to join the ManuSec Europe: Cybersecurity for critical manufacturing summit, returning to Munich on 25th - 26th February 2025 for its 8th annual edition.

Comments Off on ManuSec Europe: Cybersecurity for critical manufacturing summit

Blog: Understanding Post-Quantum Cryptography: Insights from the IoT Security Foundation Webinar

By |December 11th, 2024|Categories: Blog|

The rise of the Internet of Things (IoT) has transformed how we interact with technology in our daily lives. However, with the increasing number of connected devices comes a pressing need for robust cybersecurity measures.

Comments Off on Blog: Understanding Post-Quantum Cryptography: Insights from the IoT Security Foundation Webinar

IoTSF Bangalore: Healthcare at risk: Securing the connected medical device ecosystem

By |December 10th, 2024|Categories: Bangalore Events|

The adoption of IoT in healthcare has transformed patient care, but it also exposes the sector to serious cybersecurity risks. Connected medical devices are vulnerable to cyberattacks that can compromise patient data, disrupt essential

Comments Off on IoTSF Bangalore: Healthcare at risk: Securing the connected medical device ecosystem

The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer IoT in 2024

By |November 25th, 2024|Categories: Blog|

This report is a unique barometer of the progress that is being made in the global consumer IoT market, and in recent times can be compared to commercial products used in an enterprise setting.

Comments Off on The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer IoT in 2024

Blog: Understanding Cybersecurity Labelling for Consumer IoT Products

By |November 6th, 2024|Categories: Blog|

The rise of the Internet of Things (IoT) has transformed how we interact with technology in our daily lives. However, with the increasing number of connected devices comes a pressing need for robust cybersecurity measures.

Comments Off on Blog: Understanding Cybersecurity Labelling for Consumer IoT Products

Trusted Networking

By |October 22nd, 2024|Categories: Blog|

How do I know if your device is trusted? What do we mean by trusted? .. and how do I provide you/your device with the network credentials to access my network in the most secure manner? A new new NIST special publication on IOT networking is trying to address these issues

Comments Off on Trusted Networking