Latest Blogposts: White papersFilter blogposts
As the Internet of Things (IoT) has evolved, so too has our approach to security. A decade ago, product developers were focused on seizing the opportunities that connectivity offered instead of slowing down progress by building in complex security features at the start of a project. As a result, basic…
In order to tackle the mounting security concerns, it’s clear that the industry needs to collaborate and find solutions. When PSA Certified was founded, we outlined three areas of increasing robustness that help the silicon vendors to test the robustness of their solutions. However, in many instances, silicon vendors collaborate…
This blog outlines 10 key resources from PSA Certified which will help to guide your next product, allowing IoT security at the forefront of your design considerations.
An incredible 1.5 billion hacks on smart/IoT devices are estimated to take place in a six-month window. This is a big problem – 60% of small businesses close within six months of being hacked. In fact, the damage caused by cybercrime is predicted to skyrocket to US$10 trillion by 2025.
The IoT is moving from peripheral monitoring and reporting activities in businesses to critical operations. Consequently, the companies deploying IoT devices into their businesses (end-enterprises) need to be sure these devices are secure- but how? This new report from Beecham Research examines challenges for end-enterprises and how IoT security certification can help.
PSA Certified has collaborated with some of the leading minds working across the IoT ecosystem, from the government to cyber insurance firms, to produce this new IoT security advisory paper that shares insight, knowledge and collective best practices that the industry needs to adopt to reduce the cost of security.
The PSA Certified mission is for all connected devices to be built upon a Root of Trust, providing a foundation of assurance for trusted deployments to scale. To support this mission, we’re providing the complete IoT security toolkit you need to guide the security design and implementation of your product.