Stay up to date with the latest news, opinions and free resources from Device Authority.
From company announcements, expert opinion on the latest IoT security issues or helpful guides to support your own organization, use our filters below to find the resources most useful for you.
Introduction
The number of connected devices worldwide is projected to surpass 29 billion by 2030. From healthcare IoT and industrial OT to smart vehicles and critical infrastructure, these devices are now central to operations and innovation. The rapid evolution of IoT technology and its widespread adoption across industries have introduced new opportunities, but also new risks.
IoT and OT devices are now the backbone of modern enterprises — powering healthcare, manufacturing, automotive, and critical infrastructure. But with billions of devices in use worldwide, security and compliance are becoming increasingly complex and resource-intensive.
A recent healthcare IoT security breach exposed thousands of devices across multiple facilities, including connected medical devices and critical healthcare equipment used in hospitals. Sensitive patient information was compromised, putting not only privacy at risk but also threatening health insurance portability and compliance with the accountability act. The breach highlighted the urgent need for improved security protocols and greater visibility into the vast array of IoT devices deployed in modern healthcare environments.
The regulatory landscape for IoT compliance is rapidly evolving, with complex regulatory frameworks emerging across different regions. These frameworks impact how organizations approach device security, data management, and market access, making it essential to stay informed and adaptable. In the US, for example, NIST guidance plays a significant role. NIST, the National Institute of Standards and Technology, develops and promotes cybersecurity standards and guidelines that shape IoT security requirements and industry best practices.
Zero Trust has become the defining cybersecurity framework of our time. Built on the principle of “never trust, always verify,” it ensures that every user, workload, and device is authenticated and authorised before access is granted.
As connected and software-defined vehicles become the norm, automotive OEMs face growing cybersecurity, compliance, and supply chain challenges. The Benefits of OEM-Owned Key Management Systems for Connected Vehicles explains why centralized cryptographic control is essential—highlighting the regulatory risks of supplier-managed systems, the operational and financial advantages of Device Authority’s KeyScaler platform, and a proven path to compliance with UNECE WP.29, the EU Cyber Resilience Act, and more. Download the paper to see how OEMs can protect their brand, streamline compliance, and unlock a rapid ROI while future-proofing vehicle security.
As the IoT ecosystem expands, the importance of shared knowledge and industry collaboration cannot be overstated. Events such as the CyberArk Roadshow (Chicago, September 2025) and Automa (Amsterdam, October 2025) provide platforms for experts, enterprises, and innovators to exchange insights on securing connected devices.
The digital ecosystem is rapidly evolving, with non-human identities (NHIs) becoming increasingly prevalent across various platforms and services. Modern organizations now rely on NHIs, such as bots and service accounts, to automate processes and maintain operations within complex digital environments. As a result, securing these identities has become a critical concern for enterprises navigating today’s interconnected systems.