News & Insights

Skip to content

Blogpost filters

Filter by Tags

Clear all filters

Latest Blogposts: Explained...

Filter blogposts

Introduction to Smart City and Building Automation Security

Security for smart cities and building automation is crucial if we are to see the widespread adoption of devices on the scale needed to achieve this new reality. In this blog, we explore the smart cities market, the IoT security challenges, and how we can collaborate on the solutions.

by PSA Certified

Read more

Introduction to Consumer IoT Security

Consumer IoT security is fundamental to build trust and see end markets grow. We explore the consumer IoT market and key considerations to build the future of connected devices.

by PSA Certified

Read more

Unlocking the Value of a Root of Trust for Device Manufacturers

In this blog we explore the value of a Root of Trust (RoT) for device manufacturers (OEMs), including the security and business benefits. We also examine why it was previously hard for OEMs to implement a RoT and how the standardized PSA-RoT is combating these challenges and unlocking the value for OEMs.

by PSA Certified

Read more

Smart Speaker Security: How to Build Trust in Smart Voice Assistants

Explore the emergence of smart voice assistants and smart speakers, the security concerns threatening the adoption of these products, and how IoT security will build trust in these devices. Access an example threat model to begin your smart speaker solution.

by PSA Certified

Read more

The Road to a More Secure 2022

The PSA Certified mission is for all connected devices to be built upon a Root of Trust, providing a foundation of assurance for trusted deployments to scale. To support this mission, we’re providing the complete IoT security toolkit you need to guide the security design and implementation of your product.

by PSA Certified

Read more

Implementing the 10 Security Goals: Device Attestation and Entity Attestation Tokens Explained

 In this blog we breakdown Device Attestation, Entity Attestation Token and Relying Parties, examining what they are, why they are important and how they enable IoT devices to communicate Trust.

by PSA Certified

Read more

Cybersecurity in the Supply Chain: Securing Supply Chains From Cybersecurity Threats

In this blog we explore how the IoT is transforming the supply chain, improving abilities to monitor and assess productivity making smart supply chains more effective, efficient, and secure. However, we also examine how insecure devices threaten this and the importance of cyber security in the supply chain.

by Anurag Gupta

Read more

IoT Security at the Edge: the Importance of Trust

Edge devices are more powerful than traditional IoT devices, creating a world of possibility based on increased performance. However, they are still vulnerable to cyberattacks and have their own unique IoT security challenges. In this blog we explore IoT security for edge devices and how the PSA Certified ecosystem can help.

by PSA Certified

Read more

6 Steps to Help You #BeCyberSmart with IoT Security in October

To celebrate Cybersecurity Awareness Month, we’ve outlined the six steps you can take to #becybersmart with IoT security, including adopting a secure by design culture, embracing a security framework and working with the ecosystem.

by PSA Certified

Read more

On-Demand Webinar: Simplifying IoT Security for OEMs with PSA Certified

In the latest PSA Certified webinar, Anurag Gupta examines the challenges of IoT security for device manufacturers (OEMs) including both technical and business barriers. He also explores how PSA Certified and its comprehensive framework are offering OEMs an accessible and scalable security solution.

by Anurag Gupta

Read more