IoT Security Maturity Model: Description and Intended Use

February 15, 2019

The goal of a Security Maturity Model (SMM) is to provide a path for Internet of Things (IoT) providers to know where they need to be and how to invest in security mechanisms that meet their requirements without over-investing in unnecessary security mechanisms. It seeks to help organizations identify the appropriate approach for effective enhancement of these practices where needed. Deciding where to focus limited security resources is a challenge for most organizations given the complexity of a constantly changing security landscape.

Spotlight

Boston Technology Corporation

Boston Technology Corporation, a Boston based digital health technology services company provides mobile and web solution development for secure patient experience and engagement, medical and clinical research and IoT Human Interface applications. Please visit our case studies page at http://www.boston-technology.com/case-studies for more information on applications developed by BTC for major biotech companies, universities and hospitals. Boston Technology Corporation has been on the INC 500/5000 list of America's fastest growing private companies for three years in a row -a testimonial of our clients' faith in us.

OTHER WHITEPAPERS
news image

Zero Trust Network Access (ZTNA) and its Adoption

whitePaper | September 22, 2022

The complexity and cost of ensuring network security and remote access for employees and key business partners can overwhelm smaller businesses. Higher cloud adoption, a distributed workforce, mobile employees, the proliferation of Internet of Things (IoT) devices, and increasingly sophisticated cyberattacks make traditional methods of ensuring secure communications across your organization overly complex and expensive. Zero Trust Network Access (ZTNA) reduces the surface area for attack by following zero trust tenets to provide access to applications. ZTNA from OpenVPN Cloud creates a private, secure overlay network for businesses, which connects all of their applications, private networks, workforce, and IoT devices together without needing to own and manage a multitude of complex and hard-to-scale security and data networking gear.

Read More
news image

Smart solution for sustainable cities

whitePaper | January 8, 2020

The 19th century was a century of empires. The 20th century was a century of states. The 21st century will be a century of cities.” This quote by Wellington E. Webb, former mayor of the City of Denver, seems plausible when you look at the numbers: Although cities cover only a fraction of the Earth’s surface, they are already home to more than half of the world’s population.

Read More
news image

INTERNET OF THINGS AND UEI DATA ACQUISITION & CONTROL SYSTEMS

whitePaper | February 5, 2020

The Internet of Things (IoT) is a networked system of interconnected physical objects that have the capability of sharing data with each other and also with a cloud service for archiving and analysis. With IoT, data producing devices can easily publish data, and multiple consumer clients can receive that data from any location in the world.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 18, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security.

Read More
news image

Industrial IoT Artificial Intelligence Framework

whitePaper | February 22, 2022

Industrial Artificial Intelligence (AI) is the use of AI in applications in industry1 and a major contributor to value creation in the fourth industrial revolution. AI is being embedded in a wide range of applications, helping organizations achieve significant benefits and empowering them to transform how they deliver value to the market. This document provides guidance and assistance in the development, training, documentation, communication, integration, deployment and operation of AI-enabled industrial IoT systems.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More

Spotlight

Boston Technology Corporation

Boston Technology Corporation, a Boston based digital health technology services company provides mobile and web solution development for secure patient experience and engagement, medical and clinical research and IoT Human Interface applications. Please visit our case studies page at http://www.boston-technology.com/case-studies for more information on applications developed by BTC for major biotech companies, universities and hospitals. Boston Technology Corporation has been on the INC 500/5000 list of America's fastest growing private companies for three years in a row -a testimonial of our clients' faith in us.

Events