Modern vehicles designed for smart mobility have improved IoT connectivity. However, connected cars have also introduced software vulnerabilities and increased the risks of cybersecurity threats. Because the automotive sector faces an increase in threats, governments and regulators are taking measures to regulate the industry and mitigate cyberattacks. Want to know more about why connectivity makes vehicles vulnerable to cyberattacks and what regulations hope to achieve? Here are the 10 Things You Should Know About Cybersecurity Regulation for Automotive.
With the number of IoT connections to reach 3.5 billion by 2023 and IoT technology spending to reach $1.2T in 2022, the Industrial Internet Consortium (IIC) agreed that global industries needed more tailored cybersecurity models for their IoT devices. The result was the development of the IoT Security Maturity Model (IoT SMM). Here are 8 Things You Should Know About the IoT SMM.
The EU Cybersecurity Act was developed to respond to the preservation of the Single Market and protection of citizens’ interests. Equipped with a robust framework, the EU and the Member States are in a better global position to combat terrorism and nefarious online activity and safeguard networks and information systems. Here is an Introduction to Horizontal EU-wide Cybersecurity Requirements.
Device onboarding is the process of installing secrets and configuration data into a device, so it can connect and interact securely with an IoT platform. An IoT platform could range from an application on a user’s computer, phone or tablet, to an enterprise server, to a cloud service spanning multiple geographic regions. The device owner uses the IoT platform to manage the device by patching security vulnerabilities, installing or updating software, retrieving sensor data, interacting with actuators, and more. Here are 10 Things You Should Know About FIDO Device Onboarding (FDO).
Manufacturer Usage Description (MUD) is an IETF-defined, embedded software standard that allows IoT device manufacturers to advertise device specifications, including the intended communication patterns for the device when it connects to the network. The network then can use this intent to author a context-specific access policy so that the IoT device can function only within those parameters. This way, MUD becomes the authoritative identifier and enforcer of policy for IoT devices on the network. But how does MUD work, and what are its benefits? Here are Things You Should Know About MUD and IoT Devices.
In September 2020, the House of Representatives passed a bill requiring all Internet of Things (IoT) government devices to meet minimum security requirements. Naturally, with everything interconnected, the need for a function improvement in the security of the networks that share information is much needed. Multiple reports have indicated that around 98% of traffic from IoT devices is unencrypted to this day, and obviously, this number should be close to zero. H.R.1668 - IoT Cybersecurity Improvement Act of 2020 has the potential to improve the security of IoT devices. Here are the Top 10 Things You Should Know About the US IoT Cybersecurity Improvement Act.
In January 2020, new legislation was proposed in the UK to improve the security standards of internet-connected household devices. The goal was to protect millions of users of IoT devices from the threat of cyberattacks. Here are the Top 10 Things You Should Know About the UK IoT Cybersecurity Law.
With its destructive nature, Ransomware encrypts essential files needed for everyday job functions and contains sensitive data. Cybercriminals typically first access a specific network through internet-facing vulnerabilities, such as unpatched Remote Desktop Protocols (RDP), or by an employee clicking on malicious links or phishing emails. Unfortunately, being encrypted is usually just the tip of the iceberg for organizations. Since cyberattackers can stay undetected for between 40 to 200 days on average, organizations are risking total shutdown of their systems and a full-scale data breach. Here are the Top Mitigations to Prevent Ransomware Attacks.
Cyber attackers are constantly looking for weaknesses in any devices they can connect to, from cars to smart devices. Unfortunately, many of the IoT/ICT products that we are connected to aren't built with security in mind and can quickly become targets for cybercriminals. That is why it's imperative to embrace product security in all aspects of its lifecycle - from design, development to support and maintenance. Here are Things You Should Know About IoT/ICT Products Security.
Since security challenges prevail in IoT adoption, they require innovative solutions and continuous development for any company to truly offer the benefits IoT can provide to supply chains everywhere. For business owners, understanding these security issues and potential solutions is crucial to navigating modern supply chain challenges while trying to stay one step ahead of the competition. Here are 10 Things You Should Know About IoT Supply Chain Security,