Filtering Exploitable Ports and Minimizing Risk to and from Your Customers

What are you doing to prepare for the next “scanning malware” and “Internet Worm?” Barry Greene @ bgreene@senki.org Version 1.0 TLP:WHITE Recommendation: Operators (CSPs, ISPs, Cloud Companies, and Hosting Companies) are strongly encouraged to deploy Port Filtering on the known Exploitable ports and Source Address Validation (SAV) on their customer edge of the network as Read More

IoT Security Standards & Frameworks

Standards Organization, Trade Associations, and Other Industry Groups Embedded Microprocessor Benchmark Consortium (EEMBC) http://www.eembc.org/index.php EEMBC has roots in industry consensus benchmarks that are integral to the success of a company’s products. As stated on their site (http://www.eembc.org/about/index.php): EEMBC, an industry alliance, develops benchmarks to help system designers select the optimal processors and understand the performance Read More