SBOMs in the procurement and maintenance of connected devices Regulators in many domains have begun to look seriously at software vendors’ and operators’ management of supply chain risks. Recent software-related events have woken them up to modern software supply chains leaving connected systems highly vulnerable to attack, so they are making new rules. Vendors
June 2020 The report can be downloaded for free from IoTSF's publications page The IoT Security Foundation (IoTSF) is pleased to announce a new member-generated publication titled 'Securing the Internet of Things Supply Chain'. The white paper is an output from the Supply Chain Project team which has more than 40
When directed to manage an IoT device or router using a browser, passwords and all communications are typically passed over an unencrypted connection. This is a security vulnerability which needs attention.