In November 2020, the European Union Agency for Cybersecurity released guidelines on securing the IoT supply chain. This can be a difficult task as all…
The Zero Trust Approach to Cybersecurity
Cybersecurity threats are everywhere and new government information standards are being implemented to keep data secure. As cybersecurity practices receive updates, companies should reevaluate their…
IoT Security Weaknesses: Networks, Development & Users
There are many threats to IoT security. But among the ugly attacks, there’s good news. How do Hackers Access IoT? Hackers target IoT with malicious…
COVID-19’s Impact on Cybersecurity
The world’s greatest health concern also became its largest cybersecurity threat. As workers moved to remote settings, IT departments became strained, cyberattacks increased and companies…
Cybersecurity Standards & Protocols: NIST 800-171
The latest revision of the National Institute of Standards and Technology’s (NIST) Special Publication 800-171 was fully implemented December 31, 2017. The publication includes standards…
Cybersecurity Standards & Protocols: CMMC
The Cybersecurity Maturity Model Certification (CMMC) is an information technology standard created by the U.S. Department of Defense for the defense industrial base (DIB) –…
The IoT Chain of Trust: The Boot Process
From the moment a user activates an IoT device, how do they trust the device is secure? How do they know their data remains confidential?…
IoT Cybersecurity Improvement Act of 2020
It’s estimated by 2025, the world will contain more than 21 billion IoT devices. While IoT provides considerable benefits to both consumers and industry, so…
White Paper: Introducing Cybersecurity
Introducing Cybersecurity By Leah VanSyckel, Sealevel Systems, Inc This is the rule of the data revolution: for every action to store, secure, and use data,…