{"id":31626,"date":"2019-05-23T03:54:52","date_gmt":"2019-05-23T07:54:52","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31626"},"modified":"2019-05-23T03:54:52","modified_gmt":"2019-05-23T07:54:52","slug":"keep-an-eye-on-internet-of-things-legislation","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/23\/keep-an-eye-on-internet-of-things-legislation\/","title":{"rendered":"Keep an Eye on Internet of Things Legislation"},"content":{"rendered":"\n<p> By Susan Cassidy, Micha Nandaraj Gallo and Katharine Goodloe &#8211; A new bill introduced by Congress would require the development of detailed policy guidance that, if adopted, could significantly boost cybersecurity enhancements for the <strong>internet of things<\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/05\/tree-200795__340.jpg\" alt=\"\" class=\"wp-image-31627\" width=\"271\" height=\"185\"\/><\/figure><\/div>\n\n\n\n<p>The <strong>internet of things<\/strong>, or <strong>IoT<\/strong>, is the network of web-enabled objects and devices in society that are able to collect, transmit and exchange data. In recent years, the Defense Department repeatedly has emphasized the need to bolster cybersecurity standards and policies for these systems.<\/p>\n\n\n\n<p>A December 2016 report from the department\u2019s chief information officer warned that \u201cthe immense promise of this technology comes with immense risks,\u201d and that the proliferation of web-enabled devices means that \u201cDoD is entering a quickly deepening pool of vulnerability.\u201d<\/p>\n\n\n\n<p>Despite an increasing recognition of the potential risks, the ubiquity and rapidly changing nature of the technology and the desire to not stifle innovation in this emerging area have resulted in few new legislative requirements.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=http:\/\/www.nationaldefensemagazine.org\/articles\/2019\/5\/16\/keep-an-eye-on-internet-of-things-legislation&amp;ct=ga&amp;cd=CAEYAyoTNTA5NjU4ODgyNzE3OTcwMDI5NzIaYTJkNzVhMDE0OWE4MjFkNzpjb206ZW46VVM&amp;usg=AFQjCNF300i0CpwFWYVmYo5Ilm0nZrpEXg\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Susan Cassidy, Micha Nandaraj Gallo and Katharine Goodloe &#8211; A new bill introduced by Congress would require the development of detailed policy guidance that, if adopted, could significantly boost cybersecurity enhancements for the internet of things. The internet of <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/23\/keep-an-eye-on-internet-of-things-legislation\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-31626","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31626"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31626\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}