Quantitative Security Assessment based on Static Analysis Software security was traditionally treated as an afterthought in the overall development cycle of software products, being introduced after the software product was implemented (or even used) mainly through the inclusion of external protection mechanisms (e.g., intrusion detection and prevention techniques). According to…
Insights
The rapid rise of cyberattacks of all kinds, particularly ransomware, is pushing companies to expand their defense perimeter by applying a zero-trust approach. But how does it work? And more importantly, how can its effectiveness be calibrated? Often, an organization’s first instinct is to implement zero trust at the network…

Yann Morvan, AtosJuly 15, 2022
CRITICAL CHALLENGES IN THE INTERNET OF THINGS IoT devices are widely used and the number of such devices is still growing at a very fast pace because of their importance in ”smart everything” applications, especially the smart grid, smart homes, smart vehicles, smart cities, in industry with smart manufacturing known…
An important building block of the IoTAC project is the transfer of the project results to the standardization. These activities promote the success and impact of the achievements developed in the project, such as the IoTAC architecture and its underlying security modules. Naturally, standardization is a long-lasting process. Therefore, various…

Axel Rennoch and Sascha Hackel, Fraunhofer FOKUSJune 20, 2022
As part of the IoTAC project, the IoT-enabled Honeypot solution will be deployed in four pilot cases: a smart home setup, a prosumer cell operation, a connected car network, and a drone operation use case. In each case, the honeypot will play a pivotal role in detecting and recording malicious…

Julian Fietkau, SECT, TU BerlinMay 30, 2022
Recent Comments