Don’t you think it’s absurd that we participate in this endless race to manage and patch vulnerabilities, even though new ones appear all the time?
The risk of vulnerabilities in third-party components is not easy to mitigate. At Sternum, we believe that in order to create secure IoT devices, all parts of the device must be protected
In the second part of our series, we’ll go deeper into real-world examples, explain how parsing vulnerabilities work and reveal the surprising origin of vulnerabilities in OTA updates
One of the most surprising things in the discussion about IoT security is how it tends to form around encryption, authentication and over-the-air updates.
As enhancements to an already comprehensive document, Sternum suggests some additional guidance, focusing especially on the implementation of security
Embedded Integrity Verification - is a first-of-its-kind, patent-pending technology that offers a holistic security solution for IoT endpoint devices