Securing IoT

Securing IoT Requires a Big-Picture View

The familiar concept of devices that connect to the Internet – the so-called IoT or Internet of Things devices – is that they are…. well… devices. They are the smart watches, smart televisions, industrial controllers, traffic sensors and what not that are installed, attached, mounted, or otherwise moved into the existing space. They are devices[…]

IoT Threat Modeling

IoT Threat Modeling for Greater Security

The Internet of Things – or IoT – is growing at an explosive rate. A recent international study sponsored by the US Chamber of Commerce indicates that in just two years as many as 85% of organizations will utilize IoT to add value to their operations.[1] Consumer adoption of connected devices is currently growing by[…]

IoT Cybersecurity

Shadow IT and IoT Cybersecurity

White House Cybersecurity Coordinator Rob Joyce says IoT cybersecurity is a significant issue. In part, the issue is caused by a lack of responsible party. According to Joyce, it is difficult at best to know who is patching what and who is responsible for security. The proliferation of IoT devices that connect to or interact[…]