GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

Securing OT/IIoT – A Layered Approach

Securing OT/IIoT – A Layered Approach

While industry shifts towards the convergence of Operational Technology and Information Technology, the need to align with an ever-changing cybersecurity landscape has never been more important. Driven by internal as…

Learn More
The Contemporary Use of Vulnerability Disclosure in IoT

The Contemporary Use of Vulnerability Disclosure...

A Vulnerability Disclosure Policy is a publicly available document, typically accessed via the Vendor’s reporting web page. It is the Vendor’s statement as to how they will handle any vulnerability…

Learn More
Consumer IoT: Vulnerability Disclosure – Expanding the View into 2021

Consumer IoT: Vulnerability Disclosure – Expanding...

Picture the scene, a researcher discovers a security issue in a product, but can’t find a contact point for reporting the problem. Or, details are submitted to a device maker,…

Learn More
How to Succeed in IoT Security

How to Succeed in IoT Security

Syber Networks, a Las Vegas-based managed solutions provider, has long preached the need to protect data on any device, including personal devices that access company information. But one construction customer…

Learn More
IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements

IoT Device Cybersecurity Guidance for the Federal...

Federal agencies will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices.…

Learn More
Internet of Things (IoT) in the Federal Government

Internet of Things (IoT) in the Federal Government

The IoT is changing the world. In the 1990s, the internet began connecting all computers. By the end of that decade, cell phones began connecting all people. And now, IoT…

Learn More
2020 Unit 42 IoT Threat Report

2020 Unit 42 IoT Threat Report

According to a 2019 Gartner report, “By the end of 2019, 4.8 billion [IoT] endpoints are expected to be in use, up 21.5% from 2018.” While the internet of things…

Learn More
IoT Infrastructure: Asset Tracking Use Case

IoT Infrastructure: Asset Tracking Use Case

Internet of Technology “bridges operational technology such as sensors and actuators with information technology such as data processing and networking.” It is evident that Federal Agencies – with hundreds of…

Learn More
IoT Non-Technical Supporting Capability Core Baseline

IoT Non-Technical Supporting Capability Core...

Non-technical supporting capabilities are actions a manufacturer or third-party organization performs in support of the cybersecurity of an IoT device. This publication defines an Internet of Things (IoT) device manufacturers’…

Learn More
Securing Small-Business and Home Internet of Things (IoT) Devices

Securing Small-Business and Home Internet of...

The rapid growth of IoT devices has the potential to provide many benefits. It is also a cause for concern because IoT devices are tempting targets for attackers. State-of-the-art security…

Learn More
Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management

Trusted Internet of Things (IoT) Device...

Network-layer onboarding of an Internet of Things (IoT) device is the provisioning of network credentials to that device. Network credentials are needed so that only authorized devices can connect to…

Learn More
Internet of Things – From Buzzword To Business Case

Internet of Things – From Buzzword To Business Case

Everybody is talking about the Internet of Things – a buzzword supposed to magically solve all challenges inherent in digital transformation. With such projections, company leaders feel the urge to…

Learn More
Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products

Recommended Criteria for Cybersecurity Labeling...

In this report, NIST was directed to “identify IoT cybersecurity criteria for a consumer labeling program, and shall consider whether such a consumer labeling program may be operated in conjunction…

Learn More
Big Tech in Financial Services

Big Tech in Financial Services

This report provides a broad overview of the business models that define Big Tech, including a review of the motivations and environment that surround Big Tech’s operations in finance, with…

Learn More
A 2021 Perspective on Edge Computing

A 2021 Perspective on Edge Computing

The emergence of edge computing is linked to the need to process data close to data generation sources in IoT devices. According to the latest estimates, we could see more…

Learn More