The Ultimate Guide to IoT Security
A curated Irish edition of TechDay news, analysis, interviews, reviews, job moves, and related resources for IoT Security.
What to know about IoT Security
The Internet of Things (IoT) Security tag covers a crucial and rapidly evolving area of technology focused on protecting connected devices and networks from increasing cyber threats. As IoT devices become more integrated into homes, industries, and critical infrastructure, understanding their security challenges is essential for businesses, manufacturers, and consumers alike.
Recent stories highlight advancements and concerns in IoT security, including the development of trust frameworks for device attestation, emerging security solutions for network access control, and significant investments forecasted in cloud-based IoT security services. Articles also emphasize the complexity of securing diverse IoT environments, from smart homes to healthcare and industrial control systems.
Readers exploring this tag will learn about the latest technologies, partnerships, and strategies employed by leaders in the field to manage risks, enhance device visibility, and implement zero trust security models. Furthermore, insights into regulatory developments, the role of AI and blockchain, and response to new malware threats provide a comprehensive perspective on safeguarding IoT ecosystems.
For anyone interested in the intersection of connectivity and cybersecurity, this tag offers valuable information on how stakeholders are addressing the vulnerabilities and opportunities presented by the Internet of Things.
Analyst Insights
Research and market analysis connected to IoT Security
Tenable launches OT discovery tool for exposure management
DigiCert posts record ARR after Valimail acquisition
Nozomi named Leader in Gartner CPS security ranking
Claroty named Leader in 2026 Gartner CPS security report
Claroty named Gartner Leader again for CPS protection
Featured News
Rockwell Automation brings SecureOT to industrial systems
Australian operators face rising cyber risk as Rockwell warns poor visibility and unmanaged remote access can disrupt safety-critical systems.
Milestone turns video data into AI-driven intelligence
Demand for real-time security insights is pushing airports and public spaces towards AI tools that can analyse hundreds of cameras at once.
Consolidation Wave Hits Infosec, Sparing CISOs From Tool Sprawl
Overwhelmed CISOs are driving a consolidation wave in cybersecurity, slashing tool sprawl to close security gaps and cut mounting costs.
Expert Columns
Interviews
Interviews and video coverage from the networkRecent IoT Security News
Genetec urges tighter identity controls for security systems
AI-driven attacks are exposing weak passwords on cameras and access controls, prompting calls for stricter governance across physical security systems.
Claroty finds flaws in EnOcean SmartServer IoT platform
Flaws in widely used building controls could let remote attackers seize heating, lighting and access systems or expose sensitive data.
Industrial manufacturing tops Digitain cyber risk ranking
Factories face the highest cyber exposure, with industrial manufacturers hit by 1,567 attacks a week and 1,607 breaches a year, Digitain says.
Eseye adds SGP.32 support to AnyNet+ eSIM platform
The move is aimed at reducing IoT outage risk by adding fallback and orchestration controls alongside the latest remote SIM provisioning standard.
ServiceNow completes USD $7.75 billion Armis acquisition
The takeover should broaden ServiceNow’s security reach as it folds Armis’s asset-visibility tools into workflows for customers managing more devices and identities.
Proofpoint tracks cargo theft gang's post-breach tactics
Researchers say longer dwell time revealed how attackers scan freight, payments and banking systems to turn intrusions into cargo theft and fraud.
FIRST conference highlights AI & CVE disclosure push
Pressure is growing on AI vendors and software suppliers to improve vulnerability disclosure as experts warn basic CVE details are no longer enough.
IBM unveils AI cyber defences against autonomous attacks
Large organisations are facing faster, more autonomous cyberattacks as IBM adds AI tools to spot weak points and speed up response.
Manufacturing leads ransomware targets in 2025 report
Ransomware hit manufacturers hardest in 2025 as incidents climbed 56 per cent, with ageing factory systems and suppliers widening exposure.
Claroty adds Visibility Orchestration to xDome platform
Poor asset data can leave critical systems exposed, as the update turns xDome visibility gaps into prioritised security tasks.
Tenable launches OT asset discovery engine for security
Customers can now spot hidden operational technology and IoT devices without extra hardware, helping close risky blind spots across mixed networks.
Cyber teams unready for major attack, Sygnia finds
Most companies still lack confidence in their response as 73% of senior cyber security decision-makers say they are not ready for a major attack.
Wireless Broadband Alliance sets Wi-Fi security rules
Rogue access points, credential theft and privacy breaches are the main threats the new guidelines aim to reduce across public and enterprise Wi-Fi.
Claroty xDome adds orchestration to fix visibility gaps
The update gives security teams prioritised fixes for missing asset data as attacks on operational technology continue to expose gaps in defences.
Certes launches v7 with quantum-safe edge protection
Growing fears over harvest-now, decrypt-later attacks are driving demand for quantum-safe controls as data moves to edge systems and cloud services.
OPSWAT launches AI file screening engine for MetaDefender
Enterprises can now assess suspicious files in under 100 milliseconds, as OPSWAT adds a machine-learning layer to MetaDefender.
Yokogawa lands cyber certification for plant control systems
Buyers of industrial control systems may gain confidence as Yokogawa’s plant software clears three independent cybersecurity certifications.
Attackers exploit trust in Blackpoint Cyber report
Credential theft and trusted tools are helping intruders bypass traditional defences, with manufacturing firms among the hardest hit.
2N urges tougher cyber rules for access control devices
New EU rules could force access control makers to prove stronger patching, sourcing and disclosure processes as cyberattacks rise.
NCC Group warns DC power regulation is a cyber risk
Modern regulators now sit below software defences, raising the risk of attacks that could disrupt services, corrupt data or damage hardware.