Understand Azure IoT Hub Device Twins with Mender
Mender users may often deal with device inventory information such as CPU model, IP address, and software versions pertaining to each device. Mender users may also be using Azure IoT Hub for device fleet application telemetry which can contain a set of additional device information. These two services, Mender and Azure IoT Hub, initially may exist in silos which could mean managing and dealing wit...Read the article
Over-the-air (OTA) software updates: Build vs. buy
So, your team has established the need for an over-the-air (OTA) software update manager for the Internet-of-Things (IoT) product you plan to launch next quarter. Now, should you build it yourself in-house? Think twice!
The total cost of ownership (TCO) for an OTA software deployment manager can have many direct and indirect costs over the product life cycle. TCO is only part of what needs to b...Read the article
Security labelling on IoT devices by February 2022
The movement to get IoT device manufacturers to take security more seriously received a shot in the arm this month with the news that a new consumer-focused security labelling program for IoT devices will be delivered to the market by February 2022. The product label is being designed and developed based on work that is currently being carried out by National Institute of Standards and Technology...Read the article
Editorial response to BBC Click article on IoT Device Security
Last week, we read in a BBC Click article how security researchers were able to access two different home EV chargers and take control of them. They were able to switch the devices on and off, remove access from the owners and they were also able to successfully demonstrate how these vulnerabilities could be used to access the home network, potentially eavesdropping, via the chargers.Rpi Com... Read the article
What are the IoT security threats?
Implementing a system for provisioning OTA software updates is part of best practice in a strategy to deal with IoT security threats. The best way is to put in place a Zero trust architecture . OTA updates can be scheduled to deliver CVE updates automatically and to scale and to anticipate and patch vulnerabilities minimising the threat vectors. What are the threat types that need to be consider...Read the article