Labels for Consumer IoT Devices? Cisco’s View

Labels for Consumer IoT Devices? Cisco’s View

In its August 10, 2023, Notice of Proposed Rulemaking (NPRM) on Cybersecurity Labeling for Internet of Things (IoT), the Federal Communications Commission (FCC) asked some intriguing questions about how to improve consumer confidence and understanding of the security of IoT devices. The NPRM seeks input on whether and how the FCC should establish a cybersecurity certification and labeling program. According to the NPRM, more than 25 billion connected IoT devices are predicted to be in…

Read More

CISA publishes resource for migrating to post-quantum cryptography  

CISA publishes resource for migrating to post-quantum cryptography  

CISA publishes resource for migrating to post-quantum cryptography   | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

US Cybersecurity Strategy Shifts Liability Issues to Vendors

US Cybersecurity Strategy Shifts Liability Issues to Vendors

Governance & Risk Management , IT Risk Management , Standards, Regulations & Compliance Holding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency Questions Michael Novinson (MichaelNovinson) • March 2, 2023     Photo: The White House website A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S. government, according to…

Read More

Implement NIST IoT cybersecurity guidelines early

Implement NIST IoT cybersecurity guidelines early

Implement NIST IoT cybersecurity guidelines early | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

NIST updates software supply chain security guidance

NIST updates software supply chain security guidance

NIST updates software supply chain security guidance | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Why cyber risk assessments should be a part of your business strategy

Why cyber risk assessments should be a part of your business strategy

Why cyber risk assessments should be a part of your business strategy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

5 minutes with Sergey Strakhov – Preparing for “Q-day”

5 minutes with Sergey Strakhov – Preparing for “Q-day”

5 minutes with Sergey Strakhov – Preparing for “Q-day” | 2021-02-26 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2