5 steps to get IoT cybersecurity and third parties in sync

Typically, vulnerability assessments of the devices themselves can be performed without the vendor’s or manufacturer’s authorization, Cornell said. But enterprises should review their licensing agreements, which may have prohibitions against practices such as reverse-engineering, he cautioned.

Performing security tests on any supporting services, though, will typically require the participation, or at least the explicit consent, of the IoT system provider. “Requesting the access to perform security testing is best done during the acquisition process when the enterprise has leverage, not after,” Cornell said.

About Denim Group

Denim Group is the leading secure software development firm, serving as a trusted advisor to customers on matters of software risk and security. The company builds software for the most security conscious while helping organizations assess and mitigate risk within their existing software. Denim Group's flagship ThreadFix product accelerates the process of software vulnerability remediation, reflecting the company's rich understanding of what it takes to fix application vulnerabilities faster. Denim Group has emerged as a strong contributor to the larger application security community and has actively participated in the Open Web Application Security Project (OWASP) since shortly after its inception.

Among many other awards, Denim Group has landed on the "Inc. 5000" list - which recognizes the country's 5000 fastest-growing private companies - for five years in a row. In addition, the San Antonio Business Journal named Denim Group as one of the "Best Places to Work" in the city.

###

Denim Group is a registered service mark of Denim Group, Ltd.
Other names and brands may be claimed as the property of others.