You’ve established a security policy and a chain of trust. You’ve now given your device a strong unique identity, so that it can be authenticated in an IoT network. So what next?
A UK government report on improving cyber security of consumer Internet of Things sends a clear message that industry needs to take IoT security seriously.
The first installment in the Secure Thingz webinar series. Understand the potential of the IoT market and the risks to growth.
The US Federal Trade Commission says companies need to do more to ensure security is built into an IoT-connected product, both in development and manufacturing, and through ongoing updates through a product's life.
Attacks on connected devices will only get worse and more sophisticated, with plenty of potential entry points impacting device security. If an IoT security incident occurs, this paper provides insights into steps to take.
This paper describes how to establish a supply chain of trust, create a root of trust and a solution for secure provisioning and programming of Secure Elements and Secure MCUs.
A look at how to manage keys and certificate structures and enable secure software updates using a secure boot manager.
This presentation outlines a holistic approach to security requirements for IoT devices, including certificate structures and methodology for developing certificate hierarchy.
Currently, few IoT OEMs use root of trust-based hardware when developing their products. With growing visibility of IoT cyberattacks, this white paper introduces secure provisioning and manufacturing.
The “supply chain of trust” includes silicon vendors, embedded software companies, programming solutions providers, and OEMs. This white paper looks at establishing a “zero trust” approach.
1065 E Hillsdale Blvd # 420, Foster City, CA 94404, USA | Secure Thingz Ltd., Hudson House, Maris Lane, Trumpington, Cambridge, CB2 9FF, United Kingdom
Copyright © 2018 SecureThingz. All rights reserved.