Secure Horizons 2026 event debrief
A number of people in attendance were unaware of the regulations.
A number of people in attendance were unaware of the regulations.
The Secure Networking by Design project is part of the Digital Security by Design Challenge aimed at improving cybersecurity in today's digital landscape. It recognises the importance of continuous assurance processes in mitigating the risks of advanced attacks and evolving threat scenarios. Continuous assurance is a key component of the ManySecured® system, an open ecosystem
As we start the new year and move into 2023, there are some key developments at IoTSF that we’d like to keep you updated on – especially our support and participation in the Digital Security by Design challenge. But first, what is the Digital Security by Design challenge? The team at the University of
It is an interesting question to ponder - outside the closed industrial systems yet within an eco-system of products and services, who owns the security? And who is liable? What responsibilities should suppliers, integrators... users have? We gave Prof. Paul Dorey the challenge of speaking about the security challenge in IoT at the December 2015
During his talk at the 2015 IoTSF Conference, Robin Duke-Woolley gave his views on why security - across the 9 service sectors his company monitors - should be considered a vital enabler and not a cost. Having followed M2M (machine-to-machine) markets for more than 15 years, Robin is well placed to explain the emerging issues brought about by
In his talk "What I learned about IoT from hacking the Tesla Model S" given at the IoT Security Foundation's inaugural conference (Royal Society, London, Dec '15), Marc Rogers outlined how he managed to hack into the electronic systems of the iconic $90,000 car. Yet despite finding a number of significant vulnerabilities, Marc not