Amazing Fast Crypto for IoT — US NIST Fingers ASCON

Amazing Fast Crypto for IoT — US NIST Fingers ASCON

Implementing modern cryptography standards on tiny IoT devices is hard. They’re underpowered, need to sip battery charge and something like AES is often overkill ...
Security Boulevard
The top cyber security stories of 2022

The top cyber security stories of 2022

A look in the rearview can tell you a lot about the future, so we revisited the top cyber security stories of 2022 with experts in the field ...
CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting

CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting

CVE-2022-39064 is an availability vulnerability affecting IKEA TRÅDFRI smart bulbs. The post CyRC Vulnerability Advisory: CVE-2022-39064 IKEA TRÅDFRI smart lighting appeared first on Application Security Blog ...
CyRC Vulnerability Advisory: CVE-2022-39065 IKEA TRÅDFRI smart lighting gateway

CyRC Vulnerability Advisory: CVE-2022-39065 IKEA TRÅDFRI smart lighting gateway

CVE-2022-39065 is a vulnerability affecting the IKEA TRÅDFRI smart lighting gateway. The post CyRC Vulnerability Advisory: CVE-2022-39065 IKEA TRÅDFRI smart lighting gateway appeared first on Application Security Blog ...
Smart home under fuzzing

Smart home under fuzzing

Smart homes rely on secure devices. Fuzz testing identifies software vulnerabilities in smart devices by fuzzing wireless and IoT protocols. The post Smart home under fuzzing appeared first on Application Security Blog ...
Two-factor authentication misconfiguration bypass

Two-factor authentication misconfiguration bypass

In this post we discuss how an account with two-factor authentication could be bypassed if the password were breached. The post Two-factor authentication misconfiguration bypass appeared first on Application Security Blog ...
BYOD in the workforce: MDM and MAM with Microsoft Intune

BYOD in the workforce: MDM and MAM with Microsoft Intune

Mobile device management and mobile application management are critical to securing your organization’s data and IoT devices. The post BYOD in the workforce: MDM and MAM with Microsoft Intune appeared first on ...
NIST provides recommended criteria for cybersecurity labeling for consumer software and IoT products

NIST provides recommended criteria for cybersecurity labeling for consumer software and IoT products

Will NIST’s cybersecurity labeling for consumer software and IoT products help us achieve better security? Our experts weigh in. The post NIST provides recommended criteria for cybersecurity labeling for consumer software and ...
The future of IoT security

The future of IoT security

IoT security begins with building secure software. Learn how to embed security into your SDLC to avoid becoming an easy target for hackers ...