In March, Silicon Valley start up Verkada suffered a significant breach when hackers compromised nearly 150,000 of the company’s cloud-based security cameras. Intruders were able to access camera data collected from schools, prisons, hospitals, and several companies, including Tesla and Cloudflare.
Blog
IoT Security in Healthcare
The Internet of Things (IoT) has become prevalent in the healthcare industry due to the benefits derived from sharing patient data and treatment information through connected devices. This convergence of physical assets and digital technologies is the way of the...
IoT and Cloud Security Trends for 2021
IoT technology is dramatically impacting our everyday lives. Cloud computing is simplifying the management of IT infrastructures and reducing costs. As a result, the proliferation of IoT devices, and the shift to cloud-based computing for even mission critical...
Podcast: IoT Cybersecurity Improvement Act 2020
The intent of the IoT Cybersecurity Improvement Act 2020 is to ensure IoT technologies purchased and deployed by the U.S. Government meet well-understood security standards. The legislation is based on recommendations developed by the National Institute of Science and...
United States Federal Government Passes First IoT Security Legislation
The United States Federal Government has passed the first Internet of Things (IoT) legislation that prohibits federal agencies from purchasing IoT devices that do not meet specified security protocols. According to the Internet of Things Cybersecurity Improvement Act...
IoT, PKIs and Roots of Trust
The recently released 2019 Global PKI and IoT Trends Study reinforces the use of PKI for generating secure roots of trust in IoT applications. Unfortunately, the study states that “only 42% of IoT devices in use will rely primarily on digital certificates for...
IoT Tech Expo Presentation Slides
Smart IoT Security Deriving Business Value from Secure Connected Intelligence Wednesday, November 13, 2019 - Allegro's presentation at the IoT Tech Expo DOWNLOAD SLIDES HERE
5G and IoT Privacy and Security
In this Information Age article, Dr. Karpliuk provides several reasons for building security into IoT devices rather than trying to bolt it on later. This is exactly the case for 5G deployments – attention must be given to evaluating privacy and security, especially...
21st Century Cures Act and Medical IoT
Several healthcare and health IT industry groups are asking congress to rethink privacy concerns under the 21st Century Cures Act. While the good intent of the act is to easily facilitate the exchange of health information and provide patients with access to their...
Privacy and IoT
IoT devices are the glue to an interconnected world or things. In some cases those “things” can harvest, digest, store and share their data (which can be your personal data) to a variety of enterprise systems in the cloud. Does big brother really care about what I...
Reducing Medical IoT Related Risks
The Internet of Medical Things (IoMT) is part of, and a key enabler for the emerging field of “Digital Health.” While the field holds great promise in chronic condition management, telemedicine, remote patient monitoring and more, it also poses unique cybersecurity...
Hackers Attacking IoT Vulnerabilities
In November, 2016, Armis Security announced that approximately 20 million Amazon Echo and Google Home devices were vulnerable to attacks by a malevolent exploit called BlueBorne. This announcement was coordinated with Amazon and Google, which had released patches to...