Guest Authors Rss


Articles published by IoT Security Institute Contributing Authors.
If you would like to contribute as a Guest Author please send your submissions to This email address is being protected from spambots. You need JavaScript enabled to view it.
To ensure proper acknowledgment is provided please include a biography and any additional information where considered appropriate
 IoTS1 Large Trans Grey



Hackers don’t give a toss about policy

Quite an attention seeking title I would think. Apart from the obvious read further carrot I think there is a place for commentary on this subject. I am sure many of my industry colleagues will disagree, but have we been lured into a false sense of security relying on policies and accreditation certificates? Now let me say upfront only a fool would suggest that regulatory standards and accreditation are pointless and without purpose. The question here is have we relied on them to solve all our problems? Have organisations moved away from security tools, intelligence gathering and actionable evidence in preference for documentation controls?

What is privacy?

It’s easy to assume that we are all on the same page about what privacy is. But, as information technologies, machine learning, social media, cloud services and the availability of data driven gadgetry increasingly bridge the privacy profession with cyber security, data analytics, risk management and others, it’s important to unpack the concept a little:

Privacy is considered a basic right or freedom that a person should be able to enjoy – for example, freedom from unnecessary intrusion into one’s personal life. It can be talked about in terms of a person’s home or the physical territory they occupy… their body… their communications… their information. One challenge with defining privacy – particularly in today’s connected and social world – is that everyone has a different point of view (or threshold) in relation to what they consider to be private. To many, privacy has morphed. It’s no longer really about the right to be left alone. Increasingly, it seems to be about the ability to exercise choice or control.

Protecting Smart Buildings from Cyber Threats

Complex cyber threats to smart buildings range from locking doors and changing building temperature, to pumping gas into specific spaces to harm the occupants

In 1998, the sci-fi thriller “Dream House” was the first movie that addressed potential threats by smart home/building infrastructures. Since then, it has become almost impossible to watch a movie describing a hostile takeover of a high-class building without encountering at least one scene dealing with the disruption of the building’s infrastructures and management systems – and for a good reason. Building automation and management systems made considerable progress in recent years, and now provide a significant base for intrusion by threats capable of affecting the operational infrastructures and therefore effect the physical dimensions (by metaphysical threats) and the serviceability and survivability of the ICT systems throughout the organization.

Smart Cities – IoT – IIoT Conferences : Cyber Security has left the Building

Given the number of events covering Smart Cities and Critical infrastructure you would be mistaken for believing the security issues and challenges facing IoT, IIOT and OT are well covered. Unfortunately, this is not the case. Often, the cyber presentations are tacked onto the end of the conference or sidelined to a small room off centre stage.
Perhaps cyber security infringes upon the ” IoT / IIoT” kumbaya possibilities” and raises questions and concerns that are best left for others to address? Or perhaps, it’s an area of little interest and not deemed necessary at such prestigious events. After all, who wants to hear about the Ethics and Privacy Implications of these new technologies when you can demo a flashing, beeping, new IoT gadget? Moreover, for the price of an email address and mobile number possibly take one home. Stick around folks, the end of conference draw is coming soon.

Smart Cities and Buildings: The Emergence of the Cyber Safe Building

The Urban Developer ran a feature on the Internet of Things 

(IoT): How IoT technologies are adding value to commercial buildings. Smart commercial buildings are currently the highest users of IoT technology; and in a landscape where office vacancies are growing, simply providing a workspace in a great location is no longer sufficient. 
MEASC partnership provides real world Framework for ensuring Smart Cities are built securely by design

IoT Security Institute partner MEASC has achieved a remarkable outcome in establishing a MoU with the Egyptian government. Under the MoU Kuwait’s MEASC Safe Smart Cities will cooperate with Egyptian government agencies in the fields of digital transformation, safety and security of smart cities.

The  Privacy of Things a new concept, a new challenge.

We are familiar with Privacy within the Internet of Things. Privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment. The IoT Security Institute would like to offer for consideration and extend that concept to the next evolutionary level.

The “Privacy of Things.” Not simply consideration for the individual within an IoT eco-system but the “things” themselves.