Mender blog

Showing posts tagged: IoTsecurity x

Understand Azure IoT Hub Device Twins with Mender

Mender users may often deal with device inventory information such as CPU model, IP address, and software versions pertaining to each device. Mender users may also be using Azure IoT Hub for device fleet application telemetry which can contain a set of additional device information. These two services, Mender and Azure IoT Hub, initially may exist in silos which could mean managing and dealing wit...

Read the article

Over-the-air (OTA) software updates: Build vs. buy

So, your team has established the need for an over-the-air (OTA) software update manager for the Internet-of-Things (IoT) product you plan to launch next quarter. Now, should you build it yourself in-house? Think twice!

The total cost of ownership (TCO) for an OTA software deployment manager can have many direct and indirect costs over the product life cycle. TCO is only part of what needs to b...

Read the article

Security labelling on IoT devices by February 2022

26th Oct 2021

The movement to get IoT device manufacturers to take security more seriously received a shot in the arm this month with the news that a new consumer-focused security labelling program for IoT devices will be delivered to the market by February 2022. The product label is being designed and developed based on work that is currently being carried out by National Institute of Standards and Technology...

Read the article

Editorial response to BBC Click article on IoT Device Security

9th Aug 2021

Last week, we read in a BBC Click article how security researchers were able to access two different home EV chargers and take control of them. They were able to switch the devices on and off, remove access from the owners and they were also able to successfully demonstrate how these vulnerabilities could be used to access the home network, potentially eavesdropping, via the chargers.

Rpi Com... Read the article

What are the IoT security threats?

13th Jul 2021

Implementing a system for provisioning OTA software updates is part of best practice in a strategy to deal with IoT security threats. The best way is to put in place a Zero trust architecture . OTA updates can be scheduled to deliver CVE updates automatically and to scale and to anticipate and patch vulnerabilities minimising the threat vectors. What are the threat types that need to be consider...

Read the article