Can the Public Internet Secure Our Digital Assets?
An analysis of whether the public internet can reliably protect digital assets, covering encryption, trust models, network vulnerabilities, and emerging approaches to security at scale.
Network Error: Challenges to IoT Adoption in Southeast Asia
Explore key network-related barriers slowing IoT adoption in Southeast Asia, including connectivity gaps, infrastructure limitations, and strategies to improve reliability and performance.
Trustworthiness and the Permeation of Trust in IIoT Systems
Learn how trust principles influence IIoT systems through secure identities, reliable communication, integrity validation, and practices that build dependable industrial ecosystems.
IoT Devices Common Thread in Colossal DDoS Attacks
Explore how unsecured IoT devices have contributed to large-scale DDoS attacks, why weak configurations are exploited, and essential steps to reduce risk and strengthen network defenses.
5 Rules for Manufacturers in Securing the Internet of Things
Five essential guidelines manufacturers should follow to secure IoT products, focusing on design best practices, authentication, update processes, and ongoing risk management.
IoT Cyber-Security Puzzle
An overview of the key pieces in IoT cyber security, covering risk areas, defensive strategies, and how stakeholders can improve protection across connected systems.
The Invisible Threat to Your Health - IOT
Explore hidden health risks linked to Internet of Things technologies, including data privacy, device vulnerabilities, and implications for patient safety and care.
Leveraging Machine Learning to Fill IoT Security Gaps
How machine learning can enhance IoT security by identifying anomalies, improving threat detection, and closing gaps that traditional defenses may miss.
Security challenges for IoT
A look at the major security challenges in IoT, including device vulnerabilities, insecure communication, weak authentication, and strategies to improve protection.
Smarthome Security Concerns: The Question of Privacy
An examination of privacy issues in smart home security, focusing on data collection, user consent, device vulnerabilities, and ways to protect personal information.
Security-First Design for IoT Devices
Guidelines for designing IoT devices with a security-first approach, emphasizing authentication, secure updates, protected communication, and risk-aware architecture.
Automated Software Development Tools for Improving IoT Device Security
An overview of development tools that automate security processes for IoT devices, including code scanning, testing frameworks, and integration of DevSecOps practices.
IoT Security: How to Protect Connected Devices and the IoT Ecosystem
Guidance on securing connected devices and the broader IoT ecosystem with practices like network protection, authentication, monitoring, and patch management.
What Bruce Schneier teaches us about IoT and cybersecurity
Key lessons from Bruce Schneier on securing IoT systems, including risk awareness, threat modeling, resilience principles, and pragmatic security practices.
The Internet of Evil Things
An exploration of how malicious actors exploit connected devices and systems, examining threat vectors, motivations, and defenses against harmful IoT misuse.
How insecurity is damaging the IoT industry
Explore how insecurity in connected devices is undermining trust and growth in the Internet of Things and what challenges the industry must address.
Securing IoT Consumer Devices
Explore how insecurity in connected devices is undermining trust and growth in the Internet of Things and what challenges the industry must address.