The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer IoT in 2024

This report is a unique barometer of the progress that is being made in the global consumer IoT market, and in recent times can be compared to commercial products used in an enterprise setting.

By |November 25th, 2024|Categories: Blog|Comments Off on The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer IoT in 2024

Blog: Understanding Cybersecurity Labelling for Consumer IoT Products

The rise of the Internet of Things (IoT) has transformed how we interact with technology in our daily lives. However, with the increasing number of connected devices comes a pressing need for robust cybersecurity measures.

By |November 6th, 2024|Categories: Blog|Comments Off on Blog: Understanding Cybersecurity Labelling for Consumer IoT Products

Trusted Networking

How do I know if your device is trusted? What do we mean by trusted? .. and how do I provide you/your device with the network credentials to access my network in the most secure manner? A new new NIST special publication on IOT networking is trying to address these issues

By |October 22nd, 2024|Categories: Blog|Comments Off on Trusted Networking

Quantum Dice and SCI Semiconductor announce partnership to bring quantum-backed cryptography to advanced security systems

By |October 22nd, 2024|Categories: News|Comments Off on Quantum Dice and SCI Semiconductor announce partnership to bring quantum-backed cryptography to advanced security systems

Understanding the EU Cyber Resilience Act (CRA)

The Cyber Resilience Act (CRA) represents a significant step forward in enhancing cybersecurity for products with digital elements across the European Union. This regulation aims to improve security standards and accountability in the manufacturing of hardware and software, ensuring that they are less vulnerable to cyber threats.

By |October 18th, 2024|Categories: Blog|Comments Off on Understanding the EU Cyber Resilience Act (CRA)

The Critical Role of Randomness in IoT Security

Traditional methods of generating randosm numbers are starting to show their limits...with the increased sophistication of cybersecurity threats and the rise of advanced technologies like AI and quantum computing, the stakes are higher than ever.

By |October 16th, 2024|Categories: Blog|Comments Off on The Critical Role of Randomness in IoT Security

The Invisible Shield: How IoT Security Protects the Modern Enterprise

We all know how IoT has revolutionised the way businesses operate. By enabling interconnected devices to collect, share, and act on data, IoT has delivered vast improvements in efficiency, innovation, and customer experiences. However, with this transformative potential comes an equally substantial challenge: security.

By |October 9th, 2024|Categories: Blog|Comments Off on The Invisible Shield: How IoT Security Protects the Modern Enterprise