Q&A with Etay Maor, Founding Member of Cato CTRL

Businesses’ approach to cybersecurity today should be characterised as a proactive approach, and not reactive, according to Etay Maor, Chief Security Strategist and Founding Member of Cato CTRL, who recently spoke to IoT Insider in an exclusive interview. He also…

“It’s about securing devices”: Eseye discusses PSTI Act with IoT Insider

The passing of the Product Security and Telecommunications Infrastructure (PSTI) Act on the 29th April marked a milestone in device security for consumer electronics. The Act stipulates that manufacturers must adhere to three requirements by law; passwords need to be…

Netskope Threat Labs’ report illuminates IoT botnet threat

Eleanor Hecks, Editor of Designerly Magazine and regular contributor to IoT Insider discusses implementing IoT to protect from IoT botnet threats The latest Netskope Threat Labs shows retailers face ever-increasing risks from IoT botnets. As more companies adopt IoT devices,…

Eseye stresses importance of following PSTI Act

Eseye has brought to light the significant implications of the recent Product Security and Telecommunications Infrastructure (PSTI) Act and Regulations, which came into force on 29 April 2024. As the first IoT connectivity provider accredited as a certifying body under…

Crypto Quantique, ZARIOT and Kigen all partner

Crypto Quantique, a provider of quantum-driven security for IoT, and ZARIOT, a cellular IoT connectivity provider, have collaborated with eSIM vendor, Kigen. This global alliance employs IoT-SAFE to utilise the Hardware Root-of-Trust of any SIM, incorporating quantum-safe technology for the…

Enhancing cybersecurity standards in Robust Edge AIoT platform

ASRock Industrial announces the achievement of the IEC 62443-4-1 industry security standard certification. This certification underscores ASRock Industrial’s commitment to the highest level of cybersecurity across all stages of product development, from design inception through to the end of maintenance…

Cyber Resilience Act bans products with known vulnerabilities

In the US alone, 14,286 CVEs have been published on the National Institute of Standards and Technology website so far in 2024. Common Vulnerabilities and Exposures (CVEs) are security gaps and weaknesses in computer systems that could allow a hacker…

Tenable report shows Cloud security is lacking

Recently, Tenable, the Exposure Management company, released its latest Cloud security report titled “2024 Cloud Security Outlook: Navigating Barriers and Setting Priorities”. The report reveals that most IT managers (97%) plan to expand their Cloud environments in the coming year.…

qomodo raises £1.3m in using IoT to protect against cyber threats

qomodo, the Internet of Things (IoT) cybersecurity company, has announced the successful raising of £1.3 million in a pre-seed funding round led by Expeditions Fund, with participation from Amadeus Capital Partners, Auriga Cyber Ventures, Nio Advisors, McNally Capital, Ventures Together,…

How to secure IoT devices against growing cyber attacks

The IoT industry and cybersecurity have long been bedfellows, discussed in the same capacity as the growing number of IoT devices have meant the surface area for which cyber criminals can target has increased, too. Notably not a new topic…