0
PTC said it will work with private security researchers, partners and customers to better secure Internet of things deployments.
The company, which is positioned as one of the leading Internet of things platforms, said it is seeking contributions from researchers who find vulnerabilities in PTC’s ThingWorx products.
PTC’s program is a key part of its Coordinated Vulnerability Disclosure (CVD) Program. PTC’s products are layered throughout industrial equipment.
What is malware? Everything you need to know about viruses, trojans and malicious software | IoT in the office: Everything you need to know about the Internet of Things in the workplace | What is the IoT? Everything you need to know about the Internet of Things right now
IoT security is a key issue and one that’s critical given that everything from smart homes to grids to cities and other infrastructure is being networked.
Under the research program, PTC said it will respond to security researchers within 7 days of receiving a vulnerability. The details of PTC’s security research program rhymes with other vulnerability programs. For a researcher looking to be more involved with IoT, the PTC effort may come in handy.
More on IoT:
Enterprise IoT projects: Data, ML, security, and other key factorsFree PDF: Sensor’d Enterprise: IoT, ML, and big dataSurvey shows that most businesses are taking steps to secure IoT dataHow to use machine learning to accelerate your IoT initiativesHow to create a data strategy for enterprise IoTHow to create a security strategy for IoTSouth Korea’s IoT in full swing: From water meters to AI-powered smart buildingsSuccessful IoT deployment: The Rolls-Royce approach
IoT security:
Cybersecurity: How to devise a winning strategyFree PDF download: A Winning Strategy for CybersecurityResearch: Employee compliance is the main challenge to implementing cybersecurity strategyImprove your cybersecurity strategy: Do these 2 things10 ways to develop cybersecurity policies and best practicesCybersecurity in an IoT and mobile world: The key trendsFree PDF download: Cybersecurity in an IoT and mobile worldInfographic: Almost half of companies say cybersecurity readiness has improved in the past yearCyberweapons are now in play: From US sabotage of a North Korean missile test to hacked emergency sirens in DallasFive nightmarish attacks that show the risks of IoT securityTen best practices for securing the Internet of Things in your organizationFive pitfalls to avoid in mobile and IoT security
Related Topics:
Internet of Things
Security TV
Data Management
CXO
Data Centers
0