Looking beyond devices for complete IoT security
In the Internet of Things, attackers try to find the weakest links wherever possible. We, the security testers, should also look at the whole system. Unfortunately, assessments often stop at the device itself, excluding backend cloud services and applications.
Ecosystem of security tools at your service
Open source tools can be used in IoT security assessment to verify the attack surface, security controls, and other security-related features.
Cyber Security Nordic 2024: Key Takeaways
Key Takeaways from Cyber Security Nordic 2024 conference
Tool-Driven Security Assessment (TDSA)
Tool-Driven Security Assessment (TDSA) and provides some hard science on its applicability for IoT security
Cyber Resilience Act obligations for IoT manufacturers, importers, and distributors
Cyber Resilience Act obligations for IoT manufacturers, importers, and distributors