IoT Cybersecurity Regulation Ready

November 24, 2018

The Internet of Things (IoT) represents a significant opportunity for the global economy, society and business. Yet, if not properly secured it also poses security, safety and privacy threats to information systems, data, and users. The impact of these threats could range from minor inconvenience to serious financial loss or data breach, and negatively affect health and safety or compromise national security. With these concerns in mind, regulators have already taken action and applied sanctions against IoT providers, relying on existing laws. 1 As a result, there is a veritable minefield of issues that suppliers need to be aware of in each jurisdiction. Unfortunately, gaps in legislation, and resulting changes to regulation, usually become apparent only when something goes wrong.

Spotlight

Vertical Bridge

Vertical Bridge is the nation's largest private owner and manager of wireless communication infrastructure. Specializing in co-location services and build-to-suit towers, Vertical Bridge provides the infrastructure needed to support today's increasingly wireless culture. Founded in 2014, Vertical Bridge is Headquartered in Boca Raton, Florida.

OTHER WHITEPAPERS
news image

The Industrial IoT Landscape

whitePaper | December 30, 2019

Our mission is to design and demonstrate an Industrial Internet of Things (IIoT). We will develop the guidance needed to securely connect and profitably deploy intelligent systems across devices, edge, and cloud.

Read More
news image

Smart solution for sustainable cities

whitePaper | January 8, 2020

The 19th century was a century of empires. The 20th century was a century of states. The 21st century will be a century of cities.” This quote by Wellington E. Webb, former mayor of the City of Denver, seems plausible when you look at the numbers: Although cities cover only a fraction of the Earth’s surface, they are already home to more than half of the world’s population.

Read More
news image

Establishing Confidence in IoT Device Security: How do we get there?

whitePaper | May 14, 2021

The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace. In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.

Read More
news image

TURNING THE INTERNET OF THINGS INTO REALITY

whitePaper | January 15, 2020

The prospects are exciting. By enhancing resources with IoT, employees and organizations generate new value. Notable examples include improved air quality in cities and increased availability and reliability of rail vehicles of up to 99%. Other IoT implementations cut non-technical power losses in half, saving $150 million for an electric utilities company in Brazil, and reduce delivery days in electronics manufacturing from 25 to less than 7, improving quality at the same time.

Read More
news image

CYBER SECURITY IN THE ERA OF INDUSTRIAL IOT

whitePaper | February 6, 2020

Industrial cyber security has been a topic of much debate over the last decade. Despite the industry’s widespread acknowledgement of its significance, cyber security in the industry continues to be an elusive subject for many. A huge gap exists in understanding the implications of cyber security; however, the subject has been greatly discussed. Interestingly, the industrial environment is currently passing through a key phase, where the idea of Internet of Things (IoT) is beginning to pervade all areas of industrial operation. This ongoing change is poised to expand the complex security needs in the factories of the future.

Read More
news image

The IoT Trusted Zone

whitePaper | March 17, 2022

Among security best practices, system partitioning separates and isolates security-related hardware, software, and data in a “trusted zone” and tightly limits all attempts to access trusted content from outside the zone. Non-secure software cannot directly access secure resources. The Trusted Zone isolates security-related Microcontroller Unit (MCU) hardware, software, and external devices.

Read More

Spotlight

Vertical Bridge

Vertical Bridge is the nation's largest private owner and manager of wireless communication infrastructure. Specializing in co-location services and build-to-suit towers, Vertical Bridge provides the infrastructure needed to support today's increasingly wireless culture. Founded in 2014, Vertical Bridge is Headquartered in Boca Raton, Florida.

Events