The IoTSF publishes a new best practice guide on IoT Cybersecurity for Facilities Professionals in the Smart Built Environment

The IoT Security Foundation (IoTSF) is delighted to announce the release of its latest best practice guide on IoT cybersecurity for Facilities Professionals in the Smart Built Environment (SBE). The IoTSF established a Smart Building working group in 2017, which has expanded its membership to over 50 senior leaders from a range of stakeholder

The US National Cybersecurity Strategy

The National Cybersecurity Strategy 2023 was released by the White House on March 2nd and is a comprehensive plan to safeguard the nation's critical infrastructure and citizens from cyber threats. With the exponential growth of the Internet of Things (IoT), the strategy recognizes the urgent need to address IoT cybersecurity concerns. The IoT Security Foundation

Webinar: Smart Built Environment Guidance for Facilities Professionals

The exciting new series of monthly Zoom webinars continue on Thursday 30th March. The topic will be Smart Built Environment Guidance for Facilities Professionals. Taking place on the final Thursday of every month throughout 2023, we’ll showcase the latest thought leadership on a range of topics so that you stay ahead of

Continuous Assurance, Zero Trust Principles and the SNbD Digital Security by Design Challenge

The Secure Networking by Design project is part of the Digital Security by Design Challenge aimed at improving cybersecurity in today's digital landscape. It recognises the importance of continuous assurance processes in mitigating the risks of advanced attacks and evolving threat scenarios. Continuous assurance is a key component of the ManySecured® system, an open ecosystem

The Use of Software Bills of Materials for IoT and OT Devices

SBOMs in the procurement and maintenance of connected devices Regulators in many domains have begun to look seriously at software vendors’ and operators’ management of supply chain risks. Recent software-related events have woken them up to modern software supply chains leaving connected systems highly vulnerable to attack, so they are making new rules. Vendors