• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

The Gap Between U.S Federal and State Policies for IoT Security

In a recent article about U.S federal policy concerning IoT security, Justin Sherman identified several gaps in both cybersecurity and privacy policies. As Sherman has highlighted:

The United States federal government, like the rest of the world, is increasingly using IoT devices to improve or enhance its existing processes or to develop new capabilities altogether. But its policies on how to use those devices haven’t nearly kept pace. Not only is this problematic in theory—imagine, for instance, what would happen if thousands of electrical grid IoT sensors were hooked up with weak passwords and no strong encryption—but this has already threatened national security: Back in January, when researchers tracked U.S. military personnel over the Internet via their wearable devices, we saw the real dangers of using IoT devices without robust data privacy protections. This happened again over the summer when researchers traced military and intelligence personnel from around the world through the fitness tracking app Polar. In short, the government continues to implement IoT systems, as do their employees—that isn’t going to stop—but it’s happening without the proper policies to ensure it occurs safely.

At the same timeframe, California was to be the first State to sign a bill to set cybersecurity standards for web-connected devices. The California bill seeks to address some of the security flaws identified during the Mirai botnet attack, setting baseline cybersecurity standards for IoT devices where none exist. Although this bill could lay the groundwork for stronger IoT cybersecurity legislation at both the state and federal level, the bill’s language is too vague to be effective, and it offers an example of how not to approach IoT security.

Security researcher Robert Graham said that despite the good intentions, the bill “would do little improve security” because “it’s based on the misconception of (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/government/federal-state-policies-iot-security/

Tags: governmentInfosecInternet of thingsIoT SecurityUS Federal
2 years ago
Tripwire Guest Authors

Related Post

  • How To Tackle the 5 Biggest Enterprise IoT Security Challenges

    The proliferation of IoT devices, particularly in the workplace, has left businesses with a new…

  • The Good and Not So Good of the IoT Cybersecurity Improvement Act of 2020

    In September, the House of Representatives passed a bill requiring that all internet of things…

  • DH2i Extends Software-Defined Perimeter to IoT Devices

    DH2i has launched DxOdyssey for IoT, an instance of its software-defined perimeter (SDP) and smart…

Recent Posts

  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

52 mins ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

3 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

3 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

3 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

4 hours ago
  • Security Bloggers Network

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t