AppSec Decoded: Threats to IoT devices and the role of government regulation
Our latest AppSec Decoded video addresses the biggest threats to IoT devices and the role governments should play in IoT regulation.
Posted in IoT Security
Our latest AppSec Decoded video addresses the biggest threats to IoT devices and the role governments should play in IoT regulation.
Posted in IoT Security
Watch the latest video in our AppSec Decoded series to learn why manufacturers should consider building security into their IoT devices.
Posted in Application Security, IoT Security
IoT security begins with building secure software. Learn how to embed security into your SDLC to avoid becoming an easy target for hackers.
Posted in IoT Security
In honor of National Cybersecurity Awareness Month, we’ve released a new video series that kicks off with a discussion on the future of IoT devices.
Posted in Application Security, IoT Security
As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems?
Posted in Fuzz Testing, IoT Security
SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.
Posted in Fuzz Testing, IoT Security, Medical Device Security
5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is one of the leading testing techniques for securing 5G.
Posted in Fuzz Testing, IoT Security, Mobile App Security
Better IoT security requires a change in consumer culture and habits. But manufacturers should be doing more as well, with better guidance from government.
Posted in IoT Security
Connected toys, a hot holiday seller, aren’t all fun and games. What questions should buyers be asking about the security and privacy of connected toys?
Posted in IoT Security
IoT security isn’t keeping pace with the growth in IoT devices. Apparently, this is still news to many users and creators. What can we do to secure the IoT?
Posted in IoT Security