Icon Labs
- 3636 Westown Parkway, Suite 203
West Des Moines,
Iowa
50266
United States of America - 408-204-0194
- http://www.iconlabs.com/
Icon Labs Articles
How PKI can protect internet connected devices
A new whitepaper has been launched by Icon Labs, provider of security solutions for IoT and edge devices, titled: ‘Why PKI Matters for the IIoT’. This new IoT security white paper explains PKI, Authentication and Certificate Management – how they work, what they are, and how OEMs, manufacturers and developers can implement the latest technical developments in PKI security technologies.
Bringing justice to the wild, wild IoT
The phrase vigilante justice immediately conjures up images of classic westerns, where screen legends such as Clint Eastwood and John Wayne rode across the plains to make sure some ne’er-do-well bandits or cattle rustlers got their comeuppance and brought peace to the wild, wild west.
IoT device manufacturers can now manage PKI certificates
Icon Labs has announced its IoT Certificate management solution supports Infineon Technologies’ OPTIGA TPM (Trusted Platform Module). The partnership enables device manufacturers to manage PKI certificates throughout the product lifecycle using the OPTIGA TPM, including support for certificate injection during device manufacturing.
The first complete certificate authority solution for IoT manufacturers
Icon Labs has announced the availability of the Floodgate Certificate Authority (CA). Floodgate CA is the server side portion of Icon Labs’ PKI solution and provides certificate management for companies choosing to implement their own certificate-based authentication using public key infrastructure.
CIA exploits of IoT devices, what lessons can we learn?
Recent WikiLeak documents allege that the CIA developed, or sought to develop, or even 'borrowed', cyberattack technology that could target a wide range of IoT devices, including smart TVs, connected cars, and mobile phones. In the case of smart TVs and mobile phones, the attacks allowed these devices to be used to eavesdrop on either voice communication, data communication or both.
IoT security presentation at embedded world
Provider of security solutions for IoT and edge devices, Icon Labs, has announced that its President Alan Grau has been selected to present at embedded world. Alan’s presentation will provide engineers, product managers and executives with an overview of the available security technologies for the IoT and IIoT, and a framework to start building secure IoT devices. Engineers developing IoT devices have a wide range of choices for a...
How to protect connected home devices from cyber attacks
In July of 2014, HP Labs did a study of 10 popular IoT devices and found security was shockingly bad. The researchers studied 10 devices, looking at end-to-end security capabilities including privacy protection, authorisation, encryption, user interface protection, and code security. They found 70% of the devices had at least one major vulnerability. At the end of their study, researchers identified over 250 vulnerabilities, an average of 25 per ...
What is really needed to secure the Internet of Things?
The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices that have sensing or actuation capabilities, and are connected to each other via the internet. The IoT includes everything from wearable fitness bands and smart home appliances to factory control devices, medical devices and even automobiles.
Floodgate IoT Security Toolkit: complete solution for IoT edge devices
Icon Labs announced its Floodgate IoT Security Toolkit. The solution enables IoT edge devices to be easily and securely integrated with IoT cloud platforms, including Verizon’s ThingSpace IoT Cloud Platform, and provides security management for remote IoT devices from a single user interface. The new Icon Labs Floodgate IoT Security Toolkit provides connectivity to the cloud platform over a secure communication link for both normal dev...
Embedded credentialing product launched for IoT devices
The availability of Icon Labs' Floodgate Key Manager has been announced. This product enables OEMs and device developers to add secure credentialing services to their devices. The embedded key management solution provides integration with multiple certificate authorities, including Verizon’s certificate authority, also known as IoT SC.
How to develop secure networked and web-connected equipment
A provider of security solutions for IoT and embedded devices, Icon Labs, has announced a new resource for embedded designers working with IoT applications: a white paper focusing on “Device Security for the IIoT”.
Getting connected and staying secure
When it comes to protecting IoT devices OEMs can no longer rely on obscurity or a secure perimeter model. As Icon Labs explain, security must begin at home with a device capable of defending itself against network attacks.
Protect legacy equipment from cyber-attacks
Icon Labs has announced availability of the low cost and easy to install Floodgate Defender firewall appliance. The compact Floodgate Defender Mark III measures just 4x3.75x1.25" and provides a critical layer of security for legacy devices that comprise the IoT including SCADA networks, military equipment, critical infrastructure controllers and medical devices.
How much security does your device really require?
Everyone knows that security is critical for IoT devices but how much is needed for various types of devices? Obviously control systems in a nuclear reactor need a higher level of security than that in a home toaster. But how does an engineer decide? Icon Labs has announced a whitepaper for IoT Device Engineers and manufacturers, available here.
Integrated security platform launched for IoT devices
Icon Labs and Micrium have announced the integration of Icon Labs’ Floodgate Security Framework with Micrium’s µC/OS-III RTOS. The integrated solution creates a secure platform for IoT devices and extends the Internet of Secure Things initiative into systems and solutions with limited resources.
Icon launches cyber attack protection for industrial systems
Icon Labs has announced the release of its Floodgate Modbus Protocol Filtering product. This extension to Icon Labs’ Floodgate Security Framework adds critical protection capabilities for Industrial IoT and RTOS-based devices. Icon Labs will be demonstrating this solution on the Renesas R-IN32 Industrial Automation development platform in the Renesas booth (4594) at ATX West in Anaheim, California 9-11th February, 2016.
The largest collection of insecure devices in the world
The annual Consumer Electronics Show in Las Vegas has just wrapped up. With 160,000 attendees, 3,800 exhibitors and almost 2.5m square feet of exhibit space, this is the largest electronics show in the world. The array of new products and technologies has been featured on virtually every media outlet from Good Morning America to the BBC. By Alan Grau, President and Cofounder, Icon Labs.
A complete platform for IoT & industrial automation
Icon Labs has integrated its Floodgate security products with Renesas’ R-IN32M3 industrial network controller ICs and Renesas Synergy Platform. The integrated solution creates a secure platform for IoT and industrial automation and extends the internet of secure things initiative into industrial control systems. This integrated solution is being jointly demonstrated at the Renesas Developers Conference.
Icon Labs solve embedded OS flaw
Two recent announcements have focused attention on the security of IoT and connected devices running versions of Wind Rivers’ VxWorks. These announcements describe flaws that can be exploited by remote cyber attackers. In June 2015 and updated in July 2015, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued an advisory regarding Wind River VxWorks TCP Predictability Vulnerability for Industrial Control Systems. R...
Security system protects IoT devices from cyber-attack
A security management software suite specifically designed to protect IoT and embedded devices against cyber-attack has been released by Icon Labs. The Floodgate Security Manager (FSM) can be operated as either an on premise or a cloud-based security manager.