Establishing Principles for Internet of Things Security Part 3

Tags: , |

Is the safe and/or timely arrival of data important? So far in this blog series, we have looked at both privacy and trust. For this part, we look at principles for scenarios where safety or timeliness is important. Consider how the service would be impacted if data could be blocked or delayed. Points to

Medical IoT – A Call to Action

Tags: , , , , , , |

IoT will become all-pervasive in industry, business and domestic settings, and healthcare is one of the sectors which has a great deal to gain. Introduction of IoT-type technologies is already underway - for example in wearables, implantables, injectables, robotics and automation. Yet there is likely to be pain as adoption rates increase and significant concerns

Without security there will not be a substantial IoT market

During his talk at the 2015 IoTSF Conference, Robin Duke-Woolley gave his views on why security - across the 9 service sectors his company monitors - should be considered a vital enabler and not a cost. Having followed M2M (machine-to-machine) markets for more than 15 years, Robin is well placed to explain the emerging issues brought about by

Establishing Principles for Internet of Things Security Part 2

Tags: , , |

Does the data need to be trusted? In part one of this blog series, we looked at whether the data needs to be private? In this blog, we tackle the issue of trust in IoT devices and systems. Data may need to be protected from tampering/modification in transit. This may be a malicious attacker,

Is the Tesla Model S robust against hackers?

Tags: , , , , , , , |

In his talk "What I learned about IoT from hacking the Tesla Model S" given at the IoT Security Foundation's inaugural conference (Royal Society, London, Dec '15), Marc Rogers outlined how he managed to hack into the electronic systems of the iconic $90,000 car.   Yet despite finding a number of significant vulnerabilities, Marc not

Establishing Principles for Internet of Things Security

Tags: |

Security is an important part of almost every IoT deployment yet is often neglected in the development of systems. This blog series looks at questions that need to be considered when designing an IoT device, system or network. A common theme throughout is that investment in security at the design phase can save a lot

Consumer IoT manufacturing – what could possibly go wrong?

Tags: , , |

By Ken Munro, Director Pen Test Partners In terms of innovation, companies that make IoT devices are leaders, almost by default. They speed their products to market to fix problems that many of us didn’t know we even had. They give consumers the ability to feel that they are in some way “at home”

Gearing up for the IoTSF Security Conference – literally.

Tags: , , , |

The IoT Security Foundation has the honour of being one of the first major conferences to be held at the newly refurbished Savoy Place in London - home to the IET (nee Institute of Electrical Engineers) since 1909.   As you can see from this recently taken picture, the Maxwell Library (where attendees will enjoy

Report: Insecurity in the Internet of Things

Tags: , , , |

IoTSF founder member ElevenPaths have just released a trend report titled "Insecurity in the Internet of Things" The report is freely downloadable from HERE "Security lessons of the past 20 years have often been forgotten by existing technology vendors" Executive Summary In terms of expectation and anticipation, the Internet of