Articles
IoT Device Security: We're All Responsible
Roland Atoui
Common Challenges of Implementing a Single IoT Security Standard
Roland Atoui
A Security Framework for Military IoT Devices and Weapons Systems
Roland Atoui
IoT Botnets and DDoS Attacks: Architecting Against Disaster
Roland Atoui
Building Secure IoT Retail Solutions
Roland Atoui
The Cyber Insurance Industry's Plans Are Based on Yours
Roland Atoui
IoT and GDPR: Challenges and Opportunities
Roland Atoui
Smart Building Security: Creating Your Digital Fortress
Roland Atoui
Finding a Balance Between IoT Security Needs and Business Needs
Roland Atoui
Advantages of Hiring a Specialized Security Partner for Your Smart Manufacturing Firm
Roland Atoui
Why We Need Safety, Resilience, and Security Integrated in IoT Regulation
Roland Atoui
Authentication In IoT: Securing the Front Door
Roland Atoui
IoT Security and Physical Safety
Roland Atoui
IoT Security at Home
Roland Atoui
5G Security in an IoT Architecture
Roland Atoui
IoT Security for Smart Airports and Aviation Systems
Roland Atoui
ETSI Standard on Consumer IoT Security
Roland Atoui
IoT Security in the Medical Industry
Roland Atoui
IoT Security and Common Criteria Framework
Roland Atoui
The IoT Trust Label: Benefits and Challenges to Implementation
Roland Atoui
How Do We Enhance Trust in Connected Things?
Roland Atoui
A Security Assurance Framework for Automotive
Roland Atoui
IoT Security Concerns for the Financial Industry
Roland Atoui
IoT Security Concerns for Oil & Gas
Roland Atoui
IoT Security Concerns in the Media and Entertainment Industry
Roland Atoui
EU Cybersecurity Certification Framework and the Philosopher's Stone
Roland Atoui
IoT Security & Education: Toward a Secure Connected Campus?
Roland Atoui
Top 10 Things You Should Know About FIDO Device Onboarding
Roland Atoui
Securing IoT with Quantum Cryptography
Roland Atoui
A Systemic and Cognitive Approach to IoT Security
Roland Atoui
Top 10 Things You Should Know About The US IoT Cybersecurity Improvement Act
Roland Atoui
Should We Start Certifying Cybersecurity for AI Solutions?
Roland Atoui