Security and Connectivity for IoT Devices

Menu

Blog

Verkada Breach Highlights IoT Device Security Vulnerabilities

Verkada Breach Highlights IoT Device Security Vulnerabilities

In March, Silicon Valley start up Verkada suffered a significant breach when hackers compromised nearly 150,000 of the company’s cloud-based security cameras. Intruders were able to access camera data collected from schools, prisons, hospitals, and several companies, including Tesla and Cloudflare.

read more
IoT Security in Healthcare

IoT Security in Healthcare

The Internet of Things (IoT) has become prevalent in the healthcare industry due to the benefits derived from sharing patient data and treatment information through connected devices. This convergence of physical assets and digital technologies is the way of the...

read more
IoT and Cloud Security Trends for 2021

IoT and Cloud Security Trends for 2021

IoT technology is dramatically impacting our everyday lives. Cloud computing is simplifying the management of IT infrastructures and reducing costs. As a result, the proliferation of IoT devices, and the shift to cloud-based computing for even mission critical...

read more
Podcast: IoT Cybersecurity Improvement Act 2020

Podcast: IoT Cybersecurity Improvement Act 2020

The intent of the IoT Cybersecurity Improvement Act 2020 is to ensure IoT technologies purchased and deployed by the U.S. Government meet well-understood security standards. The legislation is based on recommendations developed by the National Institute of Science and...

read more
IoT, PKIs and Roots of Trust

IoT, PKIs and Roots of Trust

The recently released 2019 Global PKI and IoT Trends Study reinforces the use of PKI for generating secure roots of trust in IoT applications. Unfortunately, the study states that “only 42% of IoT devices in use will rely primarily on digital certificates for...

read more
IoT, PKIs and Roots of Trust

5G and IoT Privacy and Security

In this Information Age article, Dr. Karpliuk provides several reasons for building security into IoT devices rather than trying to bolt it on later. This is exactly the case for 5G deployments – attention must be given to evaluating privacy and security, especially...

read more
IoT, PKIs and Roots of Trust

21st Century Cures Act and Medical IoT

Several healthcare and health IT industry groups are asking congress to rethink privacy concerns under the 21st Century Cures Act.  While the good intent of the act is to easily facilitate the exchange of health information and provide patients with access to their...

read more
IoT, PKIs and Roots of Trust

Privacy and IoT

IoT devices are the glue to an interconnected world or things.  In some cases those “things” can harvest, digest, store and share their data (which can be your personal data) to a variety of enterprise systems in the cloud.  Does big brother really care about what I...

read more
IoT, PKIs and Roots of Trust

Reducing Medical IoT Related Risks

The Internet of Medical Things (IoMT) is part of, and a key enabler for the emerging field of “Digital Health.”  While the field holds great promise in chronic condition management, telemedicine, remote patient monitoring and more, it also poses unique cybersecurity...

read more
IoT, PKIs and Roots of Trust

Hackers Attacking IoT Vulnerabilities

In November, 2016, Armis Security announced that approximately 20 million Amazon Echo and Google Home devices were vulnerable to attacks by a malevolent exploit called BlueBorne. This announcement was coordinated with Amazon and Google, which had released patches to...

read more

Download Allegro’s Playbook

  • This field is for validation purposes and should be left unchanged.

Contact Us Today

  • This field is for validation purposes and should be left unchanged.