BG Networks’ newsletter provides interesting news and technical articles concerning a couple of aspect of IoT cybersecurity in particular.
The first is IoT cybersecurity laws, regulations, standards and best practices. This information is presented in terms of what embedded engineers, working on IoT devices, and companies manufacturing them, need to know.
This coverage distills laws, regulations, and standards down to essentials of IoT device cybersecurity features, security processes to support them, and timelines.
The second theme covers technical aspects of embedded engineering and cybersecurity. The goal is provide helpful advice when implementing cybersecurity in resource constrained embedded microprocessors and microcontrollers.
These articles will range from extending a hardware root of trust to Linux to how to secure Over the Air (OTA) update software to avoiding mistakes when implementing symmetric encryption.