Sony Pixel Power calrec Sony

IoT Security: Uplift your career and skills

12/10/2023

IoT (Internet of Things) is a technological revolution that has brought myriad benefits and positive impact to our daily lives, by connecting devices and systems to help us live and work more efficiently. The growth of IoT naturally comes with risks, especially regarding security and privacy - and as you may know these are topics Resillion is quite passionate about!

What is the IoT and why do we need to upskill? The Internet of Things, or IoT, is a term used to describe a collective network of connected devices, the technology that enables communications between those devices and the cloud, and the devices often called smart devices' themselves.

IoT devices can include sensors such as temperature and passive infrared actuators (including HVAC and domestic heating controls), appliances and gadgets. What distinguishes these devices is their ability to transmit data over the internet or other networks.

What risks do IoT devices face? The proliferation and popularity of IoT devices does bring with it risks, especially in terms of security and privacy, and addressing these problems is something that Resillion is passionate about. The pace of change in IoT and smart device development is high, and so are the attempts by hostile cyber forces to control them. That's why we always need to ensure we not only keep up with the technology but also continually upskill our development teams.

This is one of the reasons why ensuring the security of devices demands our full attention. In the field of education, this is apparent through the intensive cooperation with various educational institutions, such as the Amsterdam University of Applied Sciences. Increasing relevant knowledge and skills in the field of smart' devices is an important theme in this.

One of the most fun outputs of this collaboration are group projects: a small group of students form a project team and get to work on a topic proposed by Resillion. As they work on the projects the students get a chance to take a look behind our scenes and learn a lot about device security at the same time.

Vulnerable-by-Design environments: a safe haven for learning Our work with the Amsterdam University of Applied Sciences takes many forms. This is inevitable as the threat to IoT and smart devices is itself complex. It is important that students are exposed to complex situations and we do this using vulnerable-by-design' simulation projects. .

What is a vulnerable by design environment? A vulnerable-by-design system is an IT system (application, server or device) in which, security vulnerabilities are deliberately included. This creates an environment where vulnerabilities can be investigated in practice. In fact, a kind of practice environment where ethical hackers can discover vulnerabilities first-hand, get to the bottom of them and test the effectiveness of protective measures.

Why is a vulnerable by design environment important? Vulnerable-by-design environments are also used for developers and administrators of IT systems. These are also interesting for this group because it provides an opportunity to step into the shoes' of a hacker and experience a cyber attack in a secure environment. In practice, this appears to have a stimulating effect on awareness around information security. A vulnerable-by-design environment is not only instructive, but also just plain fun. It gives participants a huge kick the moment they manage to breach a security breach.

The vulnerable-by-design environment for IoT currently uses the ESP32 microcontroller. Due to its simplicity of use, features, and compatibility, this is currently one of the most popular microcontrollers on the market for use in devices. Examples of vulnerabilities in the environment are based on vulnerabilities Resillion encounters in practice: hard-coded keys, poor authorisation, weak encryption, firmware extraction, insecure protocols and unnecessary (debug) interfaces. But also requirements such as those of ETSI EN 303 645 and the EU Radio Equipment Directive (RED).

Collaboration with the Hogeschool of Amsterdam Our collaboration with the student project of the Hogeschool van Amsterdam typically consists of two phases, the first of which is detecting vulnerabilities in the device. Usually, students' practical knowledge on this subject is still quite limited. This phase therefore provides an opportunity to brush up on that knowledge. The second phase of the project is about improving the environment, for instance by adding new vulnerabilities, removing unintentional vulnerabilities or extending documentation.

This is also valuable for Resillion because it allows us to continuously improve the environment and keep it up to date. Vulnerable-by-design environments sometimes tend to become outdated, reducing relevance. We therefore carry out these kinds of student projects on a regular basis and each time we update the criteria to reflect the current status of cyber security.

Conclusion The security of IoT devices will remain a hot topic in the coming years. It is relevant for all parties involved: users, manufacturers, to have sufficient knowledge and skills regarding the security aspects of this product group. Do you have further questions about IoT security, training in this area or our collaboration with the Hogeschool van Amsterdam? We are always ready to answer your questions and help you in your journey towards a more secure IoT environment. Please feel free to contact us.

Here to help Questions about IoT security, training in this area or our collaboration with partners? Get in touch with our team of experts

Contact us now

lang: en_GB

Our Accreditations and Certifications
LINK: https://www.resillion.com/iot-security-uplift-your-career-and-skills/...
See more stories from eurofins

More from Eurofins

25/03/2025

The Permanent Digital Pandemic: Adapting to a new cyber reality

By Antonio Russu, Global Head of Cyber Security 25 March 2025 When you think about the omnipresent cyber threats today and how it affects companies across a...

03/03/2025

Resillion and MedUX announce a strategic partnership in Europe

Hasselt, Belgium, 3 March 2025 - Resillion, a leading provider of Quality Engineering (QE) and cyber security globally, has formed a strategic partnership with...

25/02/2025

Understanding TIBER and penetration testing: A guide for financial institutions

24 February 2025 As cyber threats become increasingly sophisticated and pervasive, banking, financial services and insurance (BFSI) institutions must adopt ro...

21/02/2025

What the latest Matter update means for smart home technology interoperability and functionality

21 February 2025 In the rapidly evolving world of smart home technology, Matte...

18/02/2025

The top three cyber security priorities for CISOs in 2025

18 February 2025 Today's cyber security landscape is more volatile than ever, with digital transformation and cloud adoption rapidly expanding the attack ...

11/02/2025

Quality Engineering: The invisible hero of digital banking

11 February 2025 Digital banking has transformed the way financial services are delivered, providing customers with seamless access to their assets and invest...

03/02/2025

Why interoperability testing for charging devices is essential in today's tech world

In an era where technology is advancing faster than ever, the simple act of char...

24/01/2025

Resillion to support Ki Certification: A new standard for wireless power

We're excited to share some fantastic news! Resillion will be one of the first two labs to support the Ki Certification, the new industry standard from the ...

09/01/2025

Pioneering NEXTGEN TV: A week of collaboration in China

By Fan Zang, Testing Operations Director In early December 2024, the Resillion team, in partnership with the NERC DTV team, hosted an eventful week-long tour a...

29/11/2024

Harnessing the power of AI-generated code: Insights from Robby Putzeys, our Global Head of Software Testing Practice

By Robby Putzeys, Global Head of Software Testing Practice AI-generated code is...

15/11/2024

Resillion's Breakthrough in Digital Forensics: A New Tool Transforms Investigations

By Sarah Formosa, Head of Digital Forensics Resillion At Resillion, we're...

24/10/2024

Resillion and partners launch real-world demonstrations of interoperable demand-side response technologies

Real-world trials of smart energy technologies that help households and business...

14/10/2024

How AI is turning cyber security into an innovation enabler

By Uri Bar-El, Head of Cyber - Resillion The evolution of cyber security The rise of artificial intelligence (AI) has ushered in a new era of possibilities, t...

01/10/2024

Reflecting on IBC 2024: A successful showcase of innovation and connection

by Bob Campbell, Head of Technology Our expert Bob Campbell, Head of Technology, Strategy and Partnerships delves into the key insights from IBC 2024, reflecti...

14/08/2024

Enhancing security with streamlined pen testing services

Discover how our streamlined pen testing services revolutionise cyber security by delivering fast, efficient, high-quality results. In today's digital land...

14/08/2024

The global impact of China's unique automotive retail model

An interesting trend in China's automotive sector has surfaced, particularly regarding electric vehicles (EVs), which could spread and become relevant to th...

24/06/2024

Resillion Hosts Successful 2024 BNTQB Partner Event

Resillion was honoured to host the partner event for the Belgium and Netherlands Testing Qualifications Board (BNTQB) on the 6th of June at our office on the Co...

13/05/2024

Exploring the next generation of wireless charging

Wireless charging is evolving, and the Wireless Power Consortium (WPC) is keeping pace with the recent launch of two updates to its charging standards - Qi2 v2....

06/05/2024

Exploring the future direction of embedded electronics at Embedded World

The recent Embedded World N rnberg 2024 event gathered together the key players in the future of embedded electronics to showcase innovations and scope out the ...

24/04/2024

Belgium adopts NIS2 law

Belgium has taken a significant step forward in bolstering its cyber security framework with the recent adoption of the NIS2 law by the House of Representatives...

08/04/2024

Resillion and Fraunhofer IIS Partnership

Resillion and Fraunhofer IIS have collaborated to create MPEG-H Audio Test Material packaged as ATSC 3.0 streams for receiver testing. MPEG-H Audio is in use in...

04/04/2024

Introducing advances in Conformance and Interoperability at the First International HbbTV Plugfest 2024

by Bob Campbell, Director of Engineering, Resillion The recent International Pl...

29/03/2024

Can we predict defects before software gets into production?

In our latest #QAInsights initiative, we described the current state of AI-driven test automation. If you want to review this post, please go to: https://www.re...

29/02/2024

The future of Free TV

by Bob Campbell, Director of Engineering, Resillion This year's Outside the Box' event hosted by Everyone TV, featured a range of speakers looking to ...

29/02/2024

How to mitigate risks with performance testing

by Rajinder Kumar, Senior Performance Test Engineer Discover the reasons for conducting various forms of performance testing and the risks you mitigate. In m...

27/02/2024

AI-driven test automation

by Kurt Neuskens, Data and Innovation Manager In our latest #QAInsights initiative, we polled our community to discover what they wanted to know more about wh...

26/02/2024

A day in the life of a test engineer

by Maikel Geirnaert, Test Engineer About the author Hi, my name is Maikel Geirnaert. I have 10 years of experience in testing and have gained a significant am...

22/02/2024

Testing the limits

Learn about load, stress, spike, soak, and capacity testing to ensure your systems are ready for any workload. by Rajinder Kumar, Senior Performance Test Engi...

22/02/2024

Charging ahead with USB-C

by Bart Grispen, Test Coordinator USB Certifications The end is hopefully in sight for technological lock-in'. By the end of 2024, all mobile phones, tab...

26/01/2024

The evolution of all that Matters

2024 promises to be another exciting year in a world of ever-increasing connected devices and smart home automation. As an active member of Connectivity Standar...

18/01/2024

Guarding the gateways: A deep dive into mobile device security

by Leigh Taylor, Head of Cyber Defence Most people worldwide have a mobile device (over 90%), and more than half of internet traffic comes from mobile users. T...

16/01/2024

7 key steps to a positive supplier relationship

by Rich Mort Baking in Success - Choosing the right partner for digital transformation success In the fast-paced world of digital transformation, organisation...

19/12/2023

IoT Cyber Security: UK and Global Landscape

The growth of Connected Devices and the Internet of Things has brought with it an increased awareness of the importance of cyber security. Businesses and organi...

12/12/2023

Yaron Kottler appointed to spearhead growth at global quality engineering and cyber security specialist Resillion

London, UK. Resillion today announced the appointment of Yaron Kottler as Execut...

28/11/2023

Quality, cost and agility in the Software development life cycle

The DORA or Accelerate metrics empirically show that speed (or throughput) and quality (or stability) are inseparable. The adoption of the engineering capabilit...

30/10/2023

Matter - One Year In

It's just over a year (October 2022) since the Connectivity Standards Alliance (CSA) launched the Matter standard, and a certification program for products ...

12/10/2023

IoT Security: Uplift your career and skills

IoT (Internet of Things) is a technological revolution that has brought myriad benefits and positive impact to our daily lives, by connecting devices and system...

12/10/2023

Ransomware Attacks: A Sobering Reminder of the Human Impact

by Leigh Taylor, Head of Cyber Defence The recent collapse of KNP Logistics, one of the UK's largest privately owned logistics groups, has thrown a stark l...

04/10/2023

Strengthening Your Digital Barriers: The Vital Importance of Regular Pen Testing and Vulnerability Scanning

In today's digital landscape, where businesses rely heavily on technology to...

19/09/2023

Resillion: Supporting Energy Digitalisation

All businesses in the Energy industry, whatever their role, increasingly rely on software systems, data networks, web applications, and automation of business p...

29/08/2023

Resillion to Serve as Exclusive CI Plus 2.0 Test Partner

As of May 2023 - Eurofins Digital Testing has changed its name to Resillion UK Limited, this name change has been reflected below in the press release from 2019...

25/08/2023

The legend of Tom, Dick or Harriet: a tale of physical security and social engineering

The following is based on real events; names and other details have been changed...

25/08/2023

DPIA - the scary elephant in the data protection room

Data Protection Impact Assessment, or DPIA for short. Even the acronym can strike fear into the hearts of those struggling with data protection compliance. But ...

22/08/2023

CPE and Home Gateway testing: what is it and what are the challenges?

High data rates for residential users have always been hindered by the last-mile bottleneck, i.e., low data rates on the last mile of the access network towar...

22/08/2023

Why you don't call your insurance provider when your house is up in flames

Your house is on fire what do you do first? You wouldn't call your insurance company to let them know your house was ablaze whilst watching the flames furt...

07/08/2023

US government launches cyber security labelling scheme for smart devices

On July 18th, 2023, the US Government announced a cybersecurity certification and labelling program for connected devices. This US Cyber Trust Mark will allow...

31/07/2023

How to implement automation when developing tests in parallel with development sprints

by Dan Martland, Technical Testing Director As we undertake many test automati...

31/07/2023

A guide to the new NIS directive (NIS2)

We previously released some guidance around the new Network and Information Security Directive (NIS2), which you can read here. NIS2 has many different areas to...

25/07/2023

Goodbye 90's QA Health Check Hello Optimisation

By Rich Mort In a past life, some years back, I attended a sales call as a Test Consultant with a fresh faced new go gettem' salesman who was determined t...