Core Cybersecurity Feature Baselinefor Securable IoT Devices

August 8, 2019

The purpose of this publication is to help improve how securable IoT devices are (e.g., easy for 279 device customers to secure within their systems and environments). IoT device manufacturers 280 will learn how they can help IoT device customers with cybersecurity risk management by 281 carefully considering which cybersecurity features to design into their devices for customers to 282 use in managing their cybersecurity risk.

Spotlight

IOT Solutions World Congress

IOT Solutions World Congress is focused on vertical markets: manufacturing; healthcare; transportation and logistics; energy and utilities; innovation and technology; and business transformation. Its aim is to put IoT to work.

OTHER WHITEPAPERS
news image

IoT Redefines Brand Experience and Customer Engagement

whitePaper | February 8, 2023

The Internet of Things (IoT), with its ability to connect devices and enable data exchange through embedded sensors, is garnering much interest across industries. TCS Global Trend 1 Study 2015 , highlights some of the major business model changes that are taking place across industries due to the adoption of the IoT. For the Consumer Packaged Goods (CPG) industry, the IoT offers widespread applicability across the value chain. CPG companies are likely to benefit the most by embedding sensors in products or services that touch end users directly, helping them drive consumer engagement throughout the consumption lifecycle. The IoT will also enable CPG companies to understand consumer needs better, thereby improving product designs or service models, leading to better brand loyalty and top-line growth.

Read More
news image

How Virtual Desktop Infrastructure (VDI) Can Help Your Business Survive the Pandemic—And Prevail in the Future

whitePaper | August 23, 2022

Growing demand for remote working solutions in light of the pandemic is bolstering the case for virtual desktop infrastructure (VDI) adoption. In this white paper, we discuss why VDI is best suited for today’s business environments, especially since remote work is poised to play a big role both now and in the “new normal” of a post-COVID-19 world. We discuss VDI’s main advantages, its shortcomings and what can be done to address them.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | July 4, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More
news image

Tailoring IoT platforms to the requirements of specific use cases

whitePaper | April 13, 2021

The Internet of Things has evolved in the last 10-15 years from a long-term visionary idea to our current reality, present in more and more domains of our everyday lives. Many IoT architectures and platforms are being proposed today by various academic and industrial consortia, in domains as diverse as smart manufacturing, smart homes, smart cities or smart transport, to name just a few. These different IoT platforms have many things in common, as they all rely on connecting some smart sensor and actuator devices to each other and to the Internet, providing value-added services and applications to us, human users, either directly, or in an indirect manner. However, by closely analyzing their structure and operational focus, we can observe that these IoT architectures and platforms have also special features tailored to the requirements of different use cases.

Read More
news image

TURNING THE INTERNET OF THINGS INTO REALITY

whitePaper | January 15, 2020

The prospects are exciting. By enhancing resources with IoT, employees and organizations generate new value. Notable examples include improved air quality in cities and increased availability and reliability of rail vehicles of up to 99%. Other IoT implementations cut non-technical power losses in half, saving $150 million for an electric utilities company in Brazil, and reduce delivery days in electronics manufacturing from 25 to less than 7, improving quality at the same time.

Read More

Spotlight

IOT Solutions World Congress

IOT Solutions World Congress is focused on vertical markets: manufacturing; healthcare; transportation and logistics; energy and utilities; innovation and technology; and business transformation. Its aim is to put IoT to work.

Events