How businesses are accelerating the growth of internet-connected smart devices. Read More
IoTSecure looks at the Internet of Things (IoT) and how it’s growing, using industry sources. Read More
Weekly IoT Worries:Insecure Data Transfer and Storage. Many connected devices and IoT lack methods to encrypt data or control access to sensitive data throughout the devices ecosystem. The lack of protection affects all types of data processed by these insecure... Read More
Weekly IoT Worries: Insufficient Privacy Protections Many connected devices, IoT, OT, BioMed, and other non-traditional endpoints use and store users’ personal information. This data can be stored directly on the devices themselves or within the greater ecosystem they belong to.... Read More
Weekly IoT Worries: Insecure Components The Internet of Things (IoT) and all of its related categories, like BioMed, ISC/SCADA, and the like, is a sector fraught with security problems. One of the more significant issues most connected devices face is... Read More
Weekly IoT Worries: Updates & Patching The Internet of Things (IoT) and their related devices like IoMT, SCADA/ICS, and a litany of other connected devices do not work in the same manner as legacy devices. For example, these connected devices... Read More
Weekly IoT Worries: Insecure Ecosystem Interfaces Insecure ecosystem interfaces include a plethora of interface methods that reside inside the ecosystem but outside of the devices themselves that allow unauthorized access to a connected device or its related components. These interfaces... Read More
Weekly IoT Worries: Insecure Network Services This flaw includes those network services running on connected devices that are either unnecessary or insecure. This issue is especially concerning if those services are exposed in any way to the internet. Either way,... Read More
Weekly IoT Worries: Weak & Easily Guessable Passwords Simply defined as the use of easily brute-forced, publicly available, or unchangeable credentials. This includes backdoors in firmware and client software that grants unauthorized access to in-production systems. Connected Devices and Internet... Read More
A Look Ahead at IoT in 2022 This last year was no exception when it came to the threats to IoT and other connected devices. Across many factors, the risk posed to connected devices has only increased alongside adopting the... Read More
Get a no-obligation, free assessment for your business. identify assets and the risks they bring.
Get an Assessment