News & Insights

Skip to content

Blogpost filters

Filter by Tags

Clear all filters

Latest Blogposts: Blogs

Filter blogposts

Securing the Future of Edge Computing

Data can be gathered from almost anywhere. There are connected devices that are amassing information from factories, fields, and mines, and from assets near roads and railways. Many of them are more powerful and complex than other connected products. They’re edge devices – they process, analyze, and store data at…

by PSA Certified

Read more

Best Practice Security Needs the Supply Chain to Work Together

In this blog we explore how composition security certification, like that provided by PSA Certified, can help understand security credentials in a fragmented supply chain.

by PSA Certified

Read more

Advice for OEMs Preparing for Security Regulation in Europe

This blog covers two of the most prominent IoT security regulations emerging in Europe (CRA and RED), what they mean for you, and how you can prepare.

by Rob Coombs

Read more

Enhancing Confidence Among the Ecosystem and Consumers: A Conversation with Tuya Smart’s Joy Liu

Enhancing Confidence Among the Ecosystem and Consumers: A Conversation with Tuya Smart’s Joy Liu In our interview, we sat down with Joy Liu, the Chief Information and Security Officer at Tuya Smart. In this discussion, Joy delves into the dynamics of the rapidly evolving world of connected devices including not…

by PSA Certified

Read more

Pioneering Industry 4.0 with Secure, Connected Solutions with Arduino

Welcome to our ‘5 Questions with Series’ spotlighting industry figures in the world of connected devices and Industry 4.0. Today, we sit down with Marta Barbero, Senior Product Manager at Arduino, leaders in the field of industrial-grade connected products and cloud infrastructure. In this Q&A, we delve into the exciting…

by PSA Certified

Read more

Get Ready for Cybersecurity Laws with PSA Certified

The Ever-changing Landscape for Manufacturers If you manufacture connected devices, the regulatory landscape you’re operating in is constantly evolving. There are a growing number of challenges to navigate; the most recent is cybersecurity legislation that provides cybersecurity requirements backed by law. These new laws impact the entire connected device value…

by Rob Coombs

Read more

Unpicking Security for Smart Locks

What are Threat Models and Why are They Needed? One of the most effective ways of understanding the security needed when creating connected devices is writing a security threat model. It helps you understand the security requirements that are particular to a device in the environment that it operates in.

by Rob Coombs

Read more

Navigating Security Requirements for Data-Driven Operations | Five Questions With… Canonical

In this interview with Canonical, we’re exploring the next wave of data-driven operations and why security is paramount to their success.

by PSA Certified

Read more

Future-Proofing Connected Devices: ADLINK’s Collaborative Approach to Industry Challenges

In our latest edition of '5 Questions with' we’re chatting to ADLINK, about their proactive measures to align with forthcoming regulations and how PSA Certified helps them.

by PSA Certified

Read more

New Report Shows that Consumers are Concerned about Device Security

In this blog, we discuss the findings of the PSA Certified 2023 Security Report and how they impact consumer IoT devices.

by PSA Certified

Read more