Little & Big Things. Massive Threats.
On top of the usual threats to IT networks, applications, and cloud services, IoT devices create an expanded, distributed attack surface.
To stay ahead of threats, our IoT Center of Excellence conducts ongoing research on chipsets, Real-Time OS (RTOS), and deployment platforms for all connected “things” – from medical devices to robotics and consumer electronics.
We use this expertise to help clients like Honeywell, Qualcomm, Citgo, and Motorola reduce risk through security-focused design, testing, and training.
US Trust Mark
IoT device manufacturers are facing new regulatory requirements in both the US and Europe. The US Trust Mark is a voluntary certification program to help IoT product manufacturers demonstrate their adherence to rigorous security and privacy standards. By obtaining the Trust Mark, companies can assure consumers that their connected devices meet robust cybersecurity requirements.
For IoT products shipping to Europe, the devices must also adhere to the Cyber Resilience Act (CRA) and the Radio Emissions Directive (RED), both of which have specific cybersecurity compliance mandates.
Our experts can assist IoT manufacturers in navigating the requirements of the US Trust Mark and similar global programs, helping to build trust and enhance the overall cybersecurity of networked devices.
Full Stack Security Analysis
At the physical, communications, and software layer
These methodical assessments help determine if attackers can bypass authentication controls, program devices, or tamper with data.
- Review architecture and create threat models.
- Attack the physical device and extract the firmware.
- Exploit mobile applications in use.
- Find weak or unprotected Web APIs.
- Assess attack surface and cloud infrastructure/ services.
Unrivaled IoT Expertise
Our strong crypto, embedded, communication protocol, and software analysis skills are put to the test on set-top boxes, personal entertainment devices, and transactional kiosks.
We’ve conducted assessments for a variety of IoT systems, including:
- Tablets that interface with a power grid.
- Sprinkler systems.
- Cloud-based printers.
- Point of Sale (PoS) and breathalyzers devices.
- PLC and mobile phone firmware drivers.
- Thales Hardware Security Module (HSM).
- Information kiosks.
- Wireless interfaces and OBD port for a connected motorcycle platform.
IoT Center of Excellence (CoE) Lead
Geoff Vaughan
Security Engineer Manager
Geoff is an Application & IT Security expert helping companies secure software and devices throughout all stages of development. He specializes in finding exploitable vulnerabilities in software applications as well as reverse engineering binaries to locate vulnerable code.