Software Integrity Blog

Archive for the 'IoT Security' Category

 

Addressing 5G security with threat modeling

5G introduces security concerns but threat modeling can help you make better informed decisions about your application security risks.

Continue Reading...

Posted in IoT Security, Managing security risks

 

How to cyber security: 5G is not magic

5G is faster than its predecessor but that doesn’t change the approach to software security for your applications.

Continue Reading...

Posted in Building secure software, IoT Security

 

Securing the IoT tsunami

IoT devices create wider attack surfaces for hackers. Learn about today’s IoT security challenges and how security testing can help.

Continue Reading...

Posted in IoT Security, Managing security risks

 

AppSec Decoded: Manufacturing more-secure IoT devices

In our latest episode of AppSec Decoded, we discuss how manufacturers can secure their IoT devices.

Continue Reading...

Posted in IoT Security, Managing security risks

 

AppSec Decoded: Threats to IoT devices and the role of government regulation

Our latest AppSec Decoded video addresses the biggest threats to IoT devices and the role governments should play in IoT regulation.

Continue Reading...

Posted in IoT Security, Managing security risks

 

AppSec Decoded: The consequences of insecure IoT devices

Watch the latest video in our AppSec Decoded series to learn why manufacturers should consider building security into their IoT devices.

Continue Reading...

Posted in Application Security, IoT Security, Managing security risks

 

How to make the future IoT more secure

IoT security begins with building secure software. Learn how to embed security into your SDLC to avoid becoming an easy target for hackers.

Continue Reading...

Posted in Building secure software, IoT Security

 

AppSec Decoded: The security dilemma of IoT devices

In honor of National Cybersecurity Awareness Month, we’ve released a new video series that kicks off with a discussion on the future of IoT devices.

Continue Reading...

Posted in Application Security, IoT Security, Managing security risks

 

How 5G and IoT devices open up the attack surface on enterprises

As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems?

Continue Reading...

Posted in Fuzz Testing, IoT Security, Managing security risks

 

Uncover SweynTooth vulnerabilities with Defensics fuzz testing

SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.

Continue Reading...

Posted in Fuzz Testing, IoT Security, Medical Device Security, Security news and research