As millions of IoT devices are deployed each year, enterprises face increasing privacy concerns and security challenges. Denim Group’s experienced IoT specialists understand how these devices interact with other systems and how to both test their security as well as fix vulnerabilities.
Fill out the form above to learn more about how Denim Group can help with your IoT security needs.
IoT devices are proliferating throughout corporate networks, raising concerns about security risks they may introduce. However, IoT technologies differ in many ways from most enterprise-ready technologies that currently exist. Understanding the risks that IoT represents and how to best quantify that risk can be a challenge for many security leaders.
IoT security is not only about the code running on the device. These devices are connected to systems that include supporting web services as well as other client applications that allow for management and reporting.
Learn how to account for these components as part of a larger attack surface during risk assessments for IoT devices from Denim Group CTO Dan Cornell in this webinar.
A critical step to understanding the security of any system is to build a threat model, and IoT devices are no exception. In this blog, Denim Group CTO Dan Cornell discusses understanding the components of the system, as well as the paths the data takes through the system provides system designers with critical information to mitigate systemic risks to the technology and architecture.
Denim Group Principal John Dickson joins The CyberWire Daily Podcast to discuss securing voting infrastructure ahead of the 2018 Mid-Term Elections.
John Dickson, CISSP, principal at Denim Group and a former U.S. Air Force officer who served in the Air Force Information Warfare Center, also expressed disappointment in the report, saying it was “completely devoid of specific policy ideas and recommendations.” For instance, Dickson says he would have liked to have seen more specific recommendations for […]
“We’re still in the wild, Wild West,” says John Dickson, a principal at Denim Group, a cybersecurity company in San Antonio, when it comes to connected products. VTech, which makes tablets, smartwatches, and other connected toys for kids, settled the complaint without admitting or denying any wrongdoing. Allan Wong, chairman and group CEO, said the […]
But security experts warn that there’s little oversight of what data these products can collect—or how it’s traded to marketers and protected from hackers. Before you connect new devices to your home network, experts say it’s important to understand the trade-offs, and how to stay safe. “We’re still in the wild, wild west,” says John […]
“Absent of serious crises or patient deaths, I’m not optimistic that this document will get the attention of many companies building medical devices,” says John Dickson, a principal with the security firm Denim Group Ltd., and who formerly served at the Air Force Information Warfare Center.
Improvements in credit card fraud detection have pushed hackers to focus on stealing legitimate login credentials, so adding an extra layer of protection to these accounts is a must, says John Dickson with the cybersecurity firm Denim Group.