PTC courts security researchers to find IoT vulnerabilities
PTC said it will work with private security researchers, partners and customers to better secure Internet of things deployments.
The company, which is positioned as one of the leading Internet of things platforms, said it is seeking contributions from researchers who find vulnerabilities in PTC's ThingWorx products.
PTC's program is a key part of its Coordinated Vulnerability Disclosure (CVD) Program. PTC's products are layered throughout industrial equipment.
What is malware? Everything you need to know about viruses, trojans and malicious software | IoT in the office: Everything you need to know about the Internet of Things in the workplace | What is the IoT? Everything you need to know about the Internet of Things right now
IoT security is a key issue and one that's critical given that everything from smart homes to grids to cities and other infrastructure is being networked.
Under the research program, PTC said it will respond to security researchers within 7 days of receiving a vulnerability. The details of PTC's security research program rhymes with other vulnerability programs. For a researcher looking to be more involved with IoT, the PTC effort may come in handy.
More on IoT:
- Enterprise IoT projects: Data, ML, security, and other key factors
- Free PDF: Sensor'd Enterprise: IoT, ML, and big data
- Survey shows that most businesses are taking steps to secure IoT data
- How to use machine learning to accelerate your IoT initiatives
- How to create a data strategy for enterprise IoT
- How to create a security strategy for IoT
- South Korea's IoT in full swing: From water meters to AI-powered smart buildings
- Successful IoT deployment: The Rolls-Royce approach
IoT security:
- Cybersecurity: How to devise a winning strategy
- Free PDF download: A Winning Strategy for Cybersecurity
- Research: Employee compliance is the main challenge to implementing cybersecurity strategy
- Improve your cybersecurity strategy: Do these 2 things
- 10 ways to develop cybersecurity policies and best practices
- Cybersecurity in an IoT and mobile world: The key trends
- Free PDF download: Cybersecurity in an IoT and mobile world
- Infographic: Almost half of companies say cybersecurity readiness has improved in the past year
- Cyberweapons are now in play: From US sabotage of a North Korean missile test to hacked emergency sirens in Dallas
- Five nightmarish attacks that show the risks of IoT security
- Ten best practices for securing the Internet of Things in your organization
- Five pitfalls to avoid in mobile and IoT security