GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

IoT Content

IoT Safe

Leveraging a hardware secure element, or ‘Root of Trust’, to establish end-to-end, chip-to-cloud security for IoT products and services is a key recommendation of the GSMA IoT Security Guidelines. This…

Learn More

Consumer IoT: Vulnerability Disclosure – Expanding...

Picture the scene, a researcher discovers a security issue in a product, but can’t find a contact point for reporting the problem. Or, details are submitted to a device maker,…

Learn More

How to Succeed in IoT Security

Syber Networks, a Las Vegas-based managed solutions provider, has long preached the need to protect data on any device, including personal devices that access company information. But one construction customer…

Learn More

Recommendations for IoT Device Manufacturers

Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers, organizations and individuals, can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving…

Learn More

IoT Device Cybersecurity Guidance for the Federal...

Federal agencies will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices.…

Learn More

Sirius Next-Generation IoT Solutions

According to Cisco, the number of connected devices will grow to 500 billion by 2030, or roughly 58 smart objects for every human on the planet. These smart devices have…

Learn More

IoT Device Cybersecurity Capability Core Baseline

Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT)…

Learn More

IoT Infrastructure: Asset Tracking Use Case

Internet of Technology “bridges operational technology such as sensors and actuators with information technology such as data processing and networking.” It is evident that Federal Agencies – with hundreds of…

Learn More

2020 Unit 42 IoT Threat Report

According to a 2019 Gartner report, “By the end of 2019, 4.8 billion [IoT] endpoints are expected to be in use, up 21.5% from 2018.” While the internet of things…

Learn More

Trusted Internet of Things (IoT) Device...

Network-layer onboarding of an Internet of Things (IoT) device is the provisioning of network credentials to that device. Network credentials are needed so that only authorized devices can connect to…

Learn More

Making the Most of the Internet of Things: The...

The Internet of Things (IoT), once just another captivating technology trend among many, is gaining deep traction in industry and government. Today, we are on the cusp of an IoT-driven…

Learn More

Securing Small-Business and Home Internet of...

The rapid growth of IoT devices has the potential to provide many benefits. It is also a cause for concern because IoT devices are tempting targets for attackers. State-of-the-art security…

Learn More

Internet Of Things: Information on Use by Federal...

Many federal agencies (56 of 90) responding to GAO’s survey reported using Internet of Things (IoT) technologies. Most often, agencies reported using IoT to: (1) control or monitor equipment or…

Learn More

Digital Transformation and the Internet of Things

There has been much said about the Internet of Things (IoT) and what it can bring to business and society - creating a more deeply connected world, informed by data…

Learn More

Internet of Things – From Buzzword To Business Case

Everybody is talking about the Internet of Things – a buzzword supposed to magically solve all challenges inherent in digital transformation. With such projections, company leaders feel the urge to…

Learn More