Internet of Things

Blogs

The FCC Cyber Trust Label Gambit: Part II

Sixty years ago, Paul Baran and Sharla Boehm at The RAND Corporation released a seminal paper that would fundamentally reshape the cyber world forever more. Their paper, simply known as Memorandum RM -- 1303, described how specialized computers could be used to route digital communications among a distributed universe of other computers. It set the stage for a flood of endless developments that resulted in the interconnected world of everything, everywhere, all the time.

3 Processes That Ensure IoT Cybersecurity Compliance

IoT devices have ingrained themselves into almost every aspect of modern life. From home assistants to industrial machinery, it's hard to find a device that isn't connected to a network and gathering data. Despite widespread adoption, IoT cybersecurity compliance remains surprisingly low. A big reason for this is the unique challenges IoT devices pose to operators.

The IoT Cyber Seal Fog

For four days in Southern France, cybersecurity experts from a broad array of different countries and sectors gathered for the annual ETSI Security Conference. The event undertaken by one of the world's major industry information-communication (ICT) standards organisations was intended to take stock of the state of cybersecurity and trends.

The FCC Cyber Trust Label Gambit

Several weeks ago, the Federal Communications Commission (FCC) embarked on one of the most far-reaching regulatory gambits in its 90-year history. It is formally known as a Notice of Proposed Rulemaking in the matter of Cybersecurity Labeling for Internet of Things, Docket 23 -- 239. The FCC offers ICT product developers the use of its FCC trademarked cyber trust mark placed on their products in exchange for accepting open-ended Commission cybersecurity jurisdiction...

Ensuring Patient Safety: A Concise Guide to Post-Market Surveillance for IoMT

A significant segment of the IoT ecosystem, the Internet of Medical Things (IoMT), is projected to grow at a compounded annual growth rate of 23.7 percent (forecast period: 2022 -- 2032). This fast growth is indicative of how rapidly IoTM is integrating into modern society, which has understandably attracted the attention of regulators. The widespread use of IoTM devices means that their malfunction or dysfunction can affect the health and lives of many.

Australian Government Issues New Guidelines to Address 5G Security Concerns in Smart Cities

The Australian Signals Directorate (ASD) has issued a new set of guidelines warning about the security risks posed by the use of 5G technology in so-called Smart Cities. The ASD's concerns align with those of the Five Eyes security alliance, which has warned that the interconnected nature of a fully connected city makes it vulnerable to cyberattacks.

Matter - The New IoT Standard

Anybody that uses more than one brand of Internet of Things (IoT) device in the home understands that there is no standard way to connect to these devices. Each manufacturer chooses from a range of different protocols to communicate with and control its devices, such as BLE, LoRa, LTE-M, NB-IoT, SigFox, ZigBee, and others.

Amazon’s Huge IoT Network

In a recent blog post, Amazon invited developers to test drive its gigantic IoT network. This network has been labeled 'Sidewalk' and was created by tying together all of Amazon's wireless devices like Amazon Echos and Ring cameras. Amazon claims this huge wireless network now covers 90% of U.S. households. Amazon created the network by transmitting Bluetooth and 900 MHz LoRa signals from its various devices.

The Short History of the Internet: From ARPANET to the Metaverse

Last Saturday marked the 53rd anniversary of the Internet. While the vast majority of its five billion users have been online for less than a decade, the Internet was taken into use on October 29th, 1969, when two computers connected to the ARPANET exchanged a message. Although the Internet has been around for a while, it remained below most people's radar until the late 1990s when the dot com boom started.

OARC-39: Notes on the Recent DNS Operations, Analysis, and Research Centre Workshop

OARC held its fall meeting in Belgrade on October 22 and 23. Here are my impressions of some of the presentations from that meeting... UI, UX, and the Registry/Registrar Landscape - One of the major reforms introduced by ICANN in the world of DNS name management was the separation of registry and registrar functions. The intent was to introduce competition into the landscape by allowing multiple registries to enter names into a common registry.

The Impact of Open Connectivity

The Internet hints at the much larger possibilities of open connectivity in enabling discoveries such as the web but for the physical world. The ideas themselves go to a deeper level of thinking about how we build systems and how we can enable the future. This post is aimed at people building systems and devices which can be interconnected to create systems and meta-devices.

The Internet as a Public Good

It is time to recognize the Internet as a public good - freely available like other basic infrastructures such as roads and sidewalks. In 1989 Tim Berners-Lee created the World Wide Web by taking advantage of open connectivity available among universities and research institutions. Today we see that same open connectivity within corporations, in our homes, and on university campuses.

Evolving From an Internet Registry to IoT Registry

As the name indicates, the Internet of Things (IoT) should be an extension of the Internet. However, in reality, most IoT applications are Siloed infrastructures. We will analyse the main challenges in the IoT and explain how an Internet registry could be evolved to provide a secure and privacy integrated Identity and access management service for IoT.

The Battle for IoT

There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsons.

Fifty Years On – What to Expect in the Next 50 Years of the Internet

When did the Internet begin? It all gets a bit hazy after so many years, but by the early 1970s, research work in packet-switched networks was well underway, and while it wasn't running TCP at the time (the flag day when the ARPANET switched over to use TCP was not until 1 January 1983) but there was the base datagram internet protocol running in the early research ARPA network in the US. Given that this is now around 50 years ago, and given that so much has happened in the last 50 years, what does the next 50 years have in store?

News Briefs

UK First Country to Implement Cybersecurity Laws for Smart Devices, Including Banning Easily Guessable Default Passwords

Millions of Smart Toothbrushes Hijacked in Cyberattack on Swiss Firm

The Insecurity of the IoT is Only Getting More Profound, Says Principal Researcher at F-Secure

Demand for Cybersecurity Workers in the United States Has Nearly Doubled Since 2013

UK Government Planning on New Laws for IoT Devices Including a Mandatory Security Labelling Scheme

McAfee Labs 2018 Report Reveals 480 New Threats Per Minute, Sharp Increase in IoT-Focused Malware

Schneier: Lasting IoT Security Will Only Happen if Governments Start Introducing Stiff Penalties

Frequency of DDoS Attacks Risen by 40% While Duration of Attacks Decrease

Internet Society Announces New Partnership with Consumers International

Microsoft Announces $5 Billion Investment in IoT Over the Next Four Years

Security Researchers are Warning About a New IoT Botnet Storm Brewing

U.S. Senators to Introduce IoT Security Bill

Major Regulatory Changes Needed as Safety and Security Merge, Warns European Commission Report

Google Launches IoT Service for Managing Devices at Scale

Permanent Denial-of-Service Attacks on the Rise, Incidents Involve Hardware-Damaging Assaults

NTIA Extends Comment Period for Its Paper “Fostering the Advancement of the Internet of Things”

Deloitte: DDoS Attacks to Enter Terabit Era in 2017

Security Expert Bruce Schneier Calls for Creation of New Government Agency for IoT Regulation

New Study Highlights Growing Risk, Lack of Urgency with Mobile and IoT Application Security

U.S. Department of Commerce Issues IoT Advancement Guidelines

Most Viewed

Most Commented