{"id":44425,"date":"2020-12-02T02:17:00","date_gmt":"2020-12-02T07:17:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=44425"},"modified":"2020-12-02T02:17:00","modified_gmt":"2020-12-02T07:17:00","slug":"against-the-odds-the-us-congress-is-improving-the-security-of-the-internet-of-things","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/12\/02\/against-the-odds-the-us-congress-is-improving-the-security-of-the-internet-of-things\/","title":{"rendered":"Against The Odds, The US Congress Is Improving The Security Of The Internet Of Things"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.forbes.com\/sites\/enriquedans\/\">Enrique Dans<\/a> &#8211; The US Congress, despite\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cbsnews.com\/news\/trump-fires-cybersecurity-chief-christopher-krebs\/\" target=\"_blank\">the damage<\/a>\u00a0the <a rel=\"noreferrer noopener\" href=\"https:\/\/edition.cnn.com\/2020\/11\/14\/opinions\/trump-refusal-to-concede-transition-covid-national-security-zelizer\/index.html\" target=\"_blank\">outgoing president\u2019s refusal<\/a>\u00a0to\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.wsj.com\/articles\/biden-team-lacks-full-u-s-cybersecurity-support-in-transition-fracas-11605891470\" target=\"_blank\">accept defeat<\/a>\u00a0is causing, seems to have managed to finalize the processing of an apparently very complete\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bankinfosecurity.com\/senate-passes-iot-cybersecurity-improvement-act-a-15399\" target=\"_blank\">law on the security of the <strong>Internet of Things<\/strong> (<strong>IoT<\/strong>)<\/a>, a nice baseline that will help consolidate a much-needed part of an environment that promises very high growth in the near future, as\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\" target=\"_blank\">billions of devices of all kinds<\/a>\u00a0are progressively connected to the internet.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2015\/08\/29\/20\/21\/safe-913452__340.jpg\" alt=\"\" width=\"589\" height=\"520\"\/><\/figure><\/div>\n\n\n\n<p>The\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.congress.gov\/bill\/116th-congress\/house-bill\/1668\/text\" target=\"_blank\">IoT Cybersecurity Improvement Act<\/a>, the unanimous approval of which has been celebrated by most of the industry, was\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.theregister.com\/2019\/03\/13\/congress_iot_security\/\" target=\"_blank\">conceived<\/a>\u00a0with the advice of companies such as\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/NortonLifeLock\" target=\"_blank\">Symantec<\/a>,\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Mozilla\" target=\"_blank\">Mozilla<\/a>\u00a0and\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/BSA_%28The_Software_Alliance%29\" target=\"_blank\">BSA The Software Alliance<\/a>, is based on a list of considerations that <strong>IoT<\/strong> devices must cover: secure development, identity management, patching, and configuration management.<\/p>\n\n\n\n<p>The law establishes a series of requirements that will allow a baseline to be established in the consideration of <strong>IoT<\/strong>-related products: consumer electronics companies will be able to choose not to comply with them, and therefore it will not be illegal to offer unsafe products on the market\u200a\u2014\u200awhich will predictably have lower prices\u200a\u2014\u200abut for those who prefer to pay for a higher level of security, there will be at least a series of basic industry standards to which they can refer, and which other manufacturers more committed to security will be able to use. Some states, like California and Oregon, have already developed legislation in this regard, but the passage of a law at the federal level is a strong incentive to create industry standards.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.forbes.com\/sites\/enriquedans\/2020\/11\/23\/against-the-odds-the-us-congress-is-improving-the-security-of-the-internet-ofthings\/&amp;ct=ga&amp;cd=CAEYBCoTMjQ4NjE1Mjg1OTUwNjU5NTMyMDIaYTJkNzVhMDE0OWE4MjFkNzpjb206ZW46VVM&amp;usg=AFQjCNEg9sgAM4rmejESyQl4-kvQjGKYLg\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enrique Dans &#8211; The US Congress, despite\u00a0the damage\u00a0the outgoing president\u2019s refusal\u00a0to\u00a0accept defeat\u00a0is causing, seems to have managed to finalize the processing of an apparently very complete\u00a0law on the security of the Internet of Things (IoT), a nice baseline that will <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/12\/02\/against-the-odds-the-us-congress-is-improving-the-security-of-the-internet-of-things\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-44425","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/44425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=44425"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/44425\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=44425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=44425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=44425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}