As millions of IoT devices are deployed each year, enterprises face increasing privacy concerns and security challenges. Denim Group’s experienced IoT specialists understand how these devices interact with other systems and how to both test their security as well as fix vulnerabilities.
Fill out the form above to learn more about how Denim Group can help with your IoT security needs.
IoT devices are proliferating throughout corporate networks, raising concerns about security risks they may introduce. However, IoT technologies differ in many ways from most enterprise-ready technologies that currently exist. Understanding the risks that IoT represents and how to best quantify that risk can be a challenge for many security leaders.
IoT security is not only about the code running on the device. These devices are connected to systems that include supporting web services as well as other client applications that allow for management and reporting.
Learn how to account for these components as part of a larger attack surface during risk assessments for IoT devices from Denim Group CTO Dan Cornell in this webinar.
A critical step to understanding the security of any system is to build a threat model, and IoT devices are no exception. In this blog, Denim Group CTO Dan Cornell discusses understanding the components of the system, as well as the paths the data takes through the system provides system designers with critical information to mitigate systemic risks to the technology and architecture.
“Digital assistants such as Alexa and Siri have a broad set of capabilities, including the ability to listen passively. People should be a bit more cautious about digital assistants, managing them like the powerful computing devices they are,” Dickson said. Because these devices are so connected and processing our data, it’s a must that basic […]
“Applications now are more valuable than ever, but they also expose organizations to more risk than ever before,” Cornell says. The problem is that, over time, organizations built huge portfolios of applications, all supporting different areas of the business or different products. Those apps have been there for decades, but security was different back then. […]
Denim Group Principal John Dickson joins The CyberWire Daily Podcast to discuss securing voting infrastructure ahead of the 2018 Mid-Term Elections.
John Dickson, CISSP, principal at Denim Group and a former U.S. Air Force officer who served in the Air Force Information Warfare Center, also expressed disappointment in the report, saying it was “completely devoid of specific policy ideas and recommendations.” For instance, Dickson says he would have liked to have seen more specific recommendations for […]
“We’re still in the wild, Wild West,” says John Dickson, a principal at Denim Group, a cybersecurity company in San Antonio, when it comes to connected products. VTech, which makes tablets, smartwatches, and other connected toys for kids, settled the complaint without admitting or denying any wrongdoing. Allan Wong, chairman and group CEO, said the […]
But security experts warn that there’s little oversight of what data these products can collect—or how it’s traded to marketers and protected from hackers. Before you connect new devices to your home network, experts say it’s important to understand the trade-offs, and how to stay safe. “We’re still in the wild, wild west,” says John […]