While industry shifts towards the convergence of Operational Technology and Information Technology, the need to align with an ever-changing cybersecurity landscape has never been more important. Driven by internal as…
Learn MoreA Vulnerability Disclosure Policy is a publicly available document, typically accessed via the Vendor’s reporting web page. It is the Vendor’s statement as to how they will handle any vulnerability…
Learn MorePicture the scene, a researcher discovers a security issue in a product, but can’t find a contact point for reporting the problem. Or, details are submitted to a device maker,…
Learn MoreSyber Networks, a Las Vegas-based managed solutions provider, has long preached the need to protect data on any device, including personal devices that access company information. But one construction customer…
Learn MoreFederal agencies will increasingly use Internet of Things (IoT) devices for the mission benefits they can offer, but care must be taken in the acquisition and implementation of IoT devices.…
Learn MoreThe IoT is changing the world. In the 1990s, the internet began connecting all computers. By the end of that decade, cell phones began connecting all people. And now, IoT…
Learn MoreInternet of Technology “bridges operational technology such as sensors and actuators with information technology such as data processing and networking.” It is evident that Federal Agencies – with hundreds of…
Learn MoreAccording to a 2019 Gartner report, “By the end of 2019, 4.8 billion [IoT] endpoints are expected to be in use, up 21.5% from 2018.” While the internet of things…
Learn MoreNon-technical supporting capabilities are actions a manufacturer or third-party organization performs in support of the cybersecurity of an IoT device. This publication defines an Internet of Things (IoT) device manufacturers’…
Learn MoreThe rapid growth of IoT devices has the potential to provide many benefits. It is also a cause for concern because IoT devices are tempting targets for attackers. State-of-the-art security…
Learn MoreNetwork-layer onboarding of an Internet of Things (IoT) device is the provisioning of network credentials to that device. Network credentials are needed so that only authorized devices can connect to…
Learn MoreMany federal agencies (56 of 90) responding to GAO’s survey reported using Internet of Things (IoT) technologies. Most often, agencies reported using IoT to: (1) control or monitor equipment or…
Learn MoreEverybody is talking about the Internet of Things – a buzzword supposed to magically solve all challenges inherent in digital transformation. With such projections, company leaders feel the urge to…
Learn MoreIn this report, NIST was directed to “identify IoT cybersecurity criteria for a consumer labeling program, and shall consider whether such a consumer labeling program may be operated in conjunction…
Learn MoreThis report provides a broad overview of the business models that define Big Tech, including a review of the motivations and environment that surround Big Tech’s operations in finance, with…
Learn More