As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems?
SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.
5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is one of the leading testing techniques for securing 5G.
Better IoT security requires a change in consumer culture and habits. But manufacturers should be doing more as well, with better guidance from government.
Posted in IoT Security | Comments Off on Experts: Better IoT security depends on changes in culture, habits
Connected toys, a hot holiday seller, aren’t all fun and games. What questions should buyers be asking about the security and privacy of connected toys?
Posted in IoT Security | Comments Off on Consumers, the security of connected toys is pretty much up to you
IoT security isn’t keeping pace with the growth in IoT devices. Apparently, this is still news to many users and creators. What can we do to secure the IoT?
Posted in IoT Security | Comments Off on Mackey: Security isn’t ‘front of mind’ in the IoT
With 36 years of experience, Behshad Rejai, VP of engineering in the Software Integrity Group, shares her views of the future of software development.
Code quality and code security aren’t the same, but they’re closely related. And in the current cyberthreat environment, developers should care about both.
The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems.
Posted in IoT Security | Comments Off on The state of cybersecurity in the physical security industry
Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?
Posted in IoT Security | Comments Off on Feds seek to up their cybersecurity game