Are you confident about your security after a patient died from a cyber-attack in a German hospital?

Posted: Sep 22, 2020

Last week there were multiple reports of a patient death in Germany that appears to be directly linked to a ransomware incident.  Briefly, a patient in need of emergency medical care died because she sought treatment at a hospital that was under cyber-attack. Düsseldorf University Clinic (DUC) was unable to admit the woman, so she was transferred to another facility 30 km (about 19 miles) away. 

Why you should implement a Code Signing solution for IoT

Posted: Jul 10, 2020

So, first things first, what is Code Signing?

Code signing is a software development process of digitally signing executable code to prove the identity of the software author AND guarantees that the code has not altered or corrupted since it was published. Both these points are extremely important for building trust from your customers and safely distributing your software.

Closing the IoT security gaps – Why Enterprises must go beyond Identify, Detect and Respond

Posted: Jun 25, 2020

Enterprise IoT Security  

Even though the IoT market is nascent, the use of unmanaged and insecure devices in enterprises are growing every day across every industry. As per numerous reports, these unmanaged IoT devices outnumber managed devices on the network by three to one. While there are common devices like smart appliances, HVACs, smart lighting, surveillance cameras in most industries, there are industry specific Operational Technology (OT) devices getting on to the IT network e.g.

Cybersecurity in the Age of Digital Transformation and IoT

Posted: Dec 10, 2019

A Digital Revolution - Is it Safe and Secure?

A digital revolution is currently underway. Most enterprises have been accelerating the pace of their digital transformation technologies like Cloud, Big Data, AI and Internet of Things (IoT). While the benefits are obvious, the attack surface is increasing dramatically. The consequences of breaches go beyond simple data loss, or distributed denial-of-service (DDoS), it is very much a safety issue, with a potentially disastrous impact in the case of critical IoT use cases in Industrial IoT, healthcare/medical devices and automotive.

Is your connected vehicle safe and secure?

Posted: Nov 28, 2019

Technology Innovation: Connected Vehicle

Connected vehicles are becoming common place these days, you can’t buy or lease a new car without some form of connectivity, and the number of connected features and services now offered is astonishing.

Tinkering for Security: tools and techniques of an IoT hacker

Posted: Oct 07, 2019

One of the differentiating risk factors for an IoT device is that its domain is in the physical world - an attacker may be able to physically interact with your device.

As a collection of engineers at Device Authority, many of us have an interest in hardware modding, and investigating devices for their security vulnerabilities in order to better protect them.

This blog will give a brief overview of IoT hacking, and some links to tools we've found useful.

IoT Security is redefining Cybersecurity with Secure by Design, Privacy by Design, Trust and Automation

Posted: Sep 13, 2019

According to Business Insider Intelligence, “$6 trillion will be invested in the Internet of Things (IoT) between 2015 and 2020, which will yield $12.6 trillion ROI over the next decade”

For the past few years these predictions have been discussed and the whole industry has been looking at IoT as the next big Industrial revolution, implying a radical change and an entirely new paradigm for a connected planet.