The Invisible Shield: How IoT Security Protects the Modern Enterprise

We all know how IoT has revolutionised the way businesses operate. By enabling interconnected devices to collect, share, and act on data, IoT has delivered vast improvements in efficiency, innovation, and customer experiences. However, with this transformative potential comes an equally substantial challenge: security.

Breaking the Black Box: Embracing Transparency in Hardware Security

The volume of cyberattacks continues to rise at an alarming rate. As the threat landscape grows more complex, a critical question persists: How secure is secure enough? Many companies claim high level security through security evaluation certificates, yet the secure designs remain hidden.

ManySecured’s Leaders in draft NIST Trusted IoT Onboarding Guide!

Tags: , , |

NIST's New 'draft' Trusted IoT Onboarding Guide with ManySecured's leaders! “Establishing trust between a network and an Internet of Things (IoT) device prior to providing the device with the credentials it needs to join the network is crucial for mitigating the risk of potential attacks. There are two possibilities for attack. One happens when a

What is the market value of a CHERI based router?

“CHERI (Capability Hardware Enhanced RISC Instructions) is a joint research project of SRI International and the University of Cambridge to revisit fundamental design choices in hardware and software to dramatically improve system security”. It is commended in a new White House Report and by CISA, the NCSC and other international government

Transparency by Design – Making AI Work for the Benefit of Society

Tags: , , , , , , , , , , , , , , , , |

In the run-up to the 2023 IoTSF annual conference we invited Tim Snape, Artificial Intelligence Group and chair of the conference panel session: ‘Strategy, Ethics and Governance in the Age of AI-Powered Cybersecurity’, to give us some insights into the discussion in advance. In the previous article we discussed the challenges society faces with

Enhancing Network Security with Device Descriptors. 

Tags: , , |

The proliferation of IoT devices and legacy systems in today’s enterprise IT infrastructure has opened up new avenues for security threats. How should these devices behave and what do we know about them? To best protect IoT devices from these threats, network security managers need to find better ways to develop their operations and