Latest Blogposts: Blogs
Filter blogpostsSecuring the Future of Edge Computing
Data can be gathered from almost anywhere. There are connected devices that are amassing information from factories, fields, and mines, and from assets near roads and railways. Many of them are more powerful and complex than other connected products. They’re edge devices – they process, analyze, and store data at…
Best Practice Security Needs the Supply Chain to Work Together
In this blog we explore how composition security certification, like that provided by PSA Certified, can help understand security credentials in a fragmented supply chain.
Advice for OEMs Preparing for Security Regulation in Europe
This blog covers two of the most prominent IoT security regulations emerging in Europe (CRA and RED), what they mean for you, and how you can prepare.
Enhancing Confidence Among the Ecosystem and Consumers: A Conversation with Tuya Smart’s Joy Liu
Enhancing Confidence Among the Ecosystem and Consumers: A Conversation with Tuya Smart’s Joy Liu In our interview, we sat down with Joy Liu, the Chief Information and Security Officer at Tuya Smart. In this discussion, Joy delves into the dynamics of the rapidly evolving world of connected devices including not…
Pioneering Industry 4.0 with Secure, Connected Solutions with Arduino
Welcome to our ‘5 Questions with Series’ spotlighting industry figures in the world of connected devices and Industry 4.0. Today, we sit down with Marta Barbero, Senior Product Manager at Arduino, leaders in the field of industrial-grade connected products and cloud infrastructure. In this Q&A, we delve into the exciting…
Get Ready for Cybersecurity Laws with PSA Certified
The Ever-changing Landscape for Manufacturers If you manufacture connected devices, the regulatory landscape you’re operating in is constantly evolving. There are a growing number of challenges to navigate; the most recent is cybersecurity legislation that provides cybersecurity requirements backed by law. These new laws impact the entire connected device value…
Unpicking Security for Smart Locks
What are Threat Models and Why are They Needed? One of the most effective ways of understanding the security needed when creating connected devices is writing a security threat model. It helps you understand the security requirements that are particular to a device in the environment that it operates in.
Navigating Security Requirements for Data-Driven Operations | Five Questions With… Canonical
In this interview with Canonical, we’re exploring the next wave of data-driven operations and why security is paramount to their success.
Future-Proofing Connected Devices: ADLINK’s Collaborative Approach to Industry Challenges
In our latest edition of '5 Questions with' we’re chatting to ADLINK, about their proactive measures to align with forthcoming regulations and how PSA Certified helps them.
New Report Shows that Consumers are Concerned about Device Security
In this blog, we discuss the findings of the PSA Certified 2023 Security Report and how they impact consumer IoT devices.