IoT Protocol Security: Everything you need to know

IoT Protocol Security: Everything you need to know

When we talk about the IoT (Internet of Things) we enter into the larger spectrum of connectivity, where along with the computer or mobile devices,…

Integration of Cybersecurity Practices in Home Automation Systems

Integration of Cybersecurity Practices in Home Automation Systems

Introduction In this era of the fourth industrial revolution wave (IIOT), most homes contain different gadgets or machines that are automated. These automated gadgets offer…

Securing Message transfer protocol MQTT in IoT Environment

Securing Message Transfer Protocol MQTT in IoT Environment

The Internet of Things or IoT is a buzzword that we encounter a lot these days. Smart boxes, light bulbs, thermostats, voice assistants, and smart…

blockchains-potential-in-improving-cybersecurity

Blockchain’s Potential in Improving Cybersecurity

Blockchain: help or hindrance? The adoption of blockchain technology has gained a lot of traction over the last few years. However, blockchain’s potential to disrupt…

Building an Effective Vulnerability Management Program

Building an Effective Vulnerability Management Program

The traditional method of scoring a vulnerability is insufficient when we want to prioritize its mitigation. These vulnerabilities are weighed on the scoring system of…

Security considerations for Smart Cameras

Security Considerations for Smart Cameras

With the evolution of the cameras, attackers have also become more skilled and better equipped. We are seeing many attacks on camera infrastructure where the…