IoT security Archives - Page 2 of 8 - IoTAC


Getting more ‘intelligent’ about internet security

The SerIoT project, the result of which is exploited in the IoTAC project, was coordinated by the Institute of Theoretical and Applied Informatics, Polish Academy of Sciences. SerIoT introduced self-awareness into software-defined networking (SDN) through a patented cognitive packet network (CPN) in which the packets route themselves adaptively via SDN…

Disposable identities, what are they?

The classical tools and theories of the international political economy and diplomacy were the product of and well suited for the analogue world, where old strategies built on resource scarcity and ‘real’ events with physical objects apply. As transportation was experiencing revolution with cars, roads and highways, becoming mainstream, it…

Global Platform and ioXt Alliance Memorandum of Understanding

Global Platform and the ioXt Alliance have signed a Memorandum of Understanding to collaborate on aligning IoT security schemes, help harmonize standards and reduce fragmentation across the cybersecurity industry. “By simplifying security evaluation, and reusing certified components, manufacturers and vendors are provided with assurances that products will be protected and meet…

IoTAC Software Security Evaluation Framework

Quantitative Security Assessment based on Static Analysis Software security was traditionally treated as an afterthought in the overall development cycle of software products, being introduced after the software product was implemented (or even used) mainly through the inclusion of external protection mechanisms (e.g., intrusion detection and prevention techniques). According to…

The Need for Improving Remote Access Security

Barracuda Networks published its latest report on “The state of industrial security in 2022”. 800 managers responsible for IIoT/OT participated in a global survey fielded in April 2022, from a broad range of industries, in the U.S., Europe, and Australia. 94% of the organizations surveyed experienced a security incident in…

IAM at the heart of the zero trust approach

The rapid rise of cyberattacks of all kinds, particularly ransomware, is pushing companies to expand their defense perimeter by applying a zero-trust approach. But how does it work? And more importantly, how can its effectiveness be calibrated? Often, an organization’s first instinct is to implement zero trust at the network…
Yann Morvan
July 15, 2022

Proceedings of the EuroCybersec 2021 Workshop

The Proceedings of the EuroCybersec 2021 Workshop have been published! This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021, organized by Professor Erol Gelenbe (IITIS-PAN). The 10 selected papers focus on topics of…