Press Release: Internet of Things Security Foundation Drives Plan for the Supply Chain of Trust

Tags: , , |

Launches 5 priority Working Groups Release Date: May 12 2016 The IoT Security Foundation (IoTSF), a non-profit member organisation established to raise the quality of security across IoT, has announced the formation of a number of working groups as it promotes the concept of the Supply Chain of Trust. Security is often considered in

Is Your Enterprise Security Insured?

Tags: , , , , |

In 2012, the World Economic Forum published a research report titled “The future of manufacturing: opportunities to drive economic growth [ref 1]. The development and adoption of the Internet of Things (IoT) is a critical element of smarter manufacturing. The next wave of manufacturing with IoT enabled systems is referred to Industrie 4.0, which

We’re looking for a Plenary Chair – could it be you (or someone you know)?

Tags: , |

The IoTSF Plenary Chair Role is Key for Progress: Since we launched The Internet of Things Security Foundation last September, we have been widely welcomed by industry, stakeholder groups and press around the globe. This is because of the growing realisation that the expanding universe of connected devices and systems provides not just a

Establishing Principles for Internet of Things Security Part 7

Tags: |

Does the data need to be audited? So far in the IoT Security principles blog series we have looked at the architecture of devices, data privacy and trust, making sure that data gets to where it needs to be and on time, controlling access to devices, software updates and the transfer of ownership of devices.

Establishing Principles for Internet of Things Security Part 6

Tags: |

Will ownership of the device need to be managed or transferred in a secure manner? This penultimate blog in the IoT Security principles series, addresses transfer of ownership and how to manage that in a secure manner. Many IoT devices will change ownership at some point in their lifetime. To preserve the security of

Establishing Principles for Internet of Things Security Part 5

Tags: |

Is it necessary to update the software on the device? The last blog in this series was about restricting access to a device. This one provides some high level principles about software updates. If a device is running out-of-date software, it may contain unpatched security vulnerabilities. Such vulnerabilities may allow exploitation of the device

Establishing Principles for Internet of Things Security Part 4

Tags: , |

Is it necessary to restrict access to or control of the device? In part four of the blog series on principles for IoT security, we look at general requirements in order to help prevent unauthorised access or control. If an attacker gains control of the device they may be able to access sensitive data,

Establishing Principles for Internet of Things Security Part 3

Tags: , |

Is the safe and/or timely arrival of data important? So far in this blog series, we have looked at both privacy and trust. For this part, we look at principles for scenarios where safety or timeliness is important. Consider how the service would be impacted if data could be blocked or delayed. Points to

Medical IoT – A Call to Action

Tags: , , , , , , |

IoT will become all-pervasive in industry, business and domestic settings, and healthcare is one of the sectors which has a great deal to gain. Introduction of IoT-type technologies is already underway - for example in wearables, implantables, injectables, robotics and automation. Yet there is likely to be pain as adoption rates increase and significant concerns