News & Updates

View All
Blog

Connect With Us

Prevent IoT Device Hacking With Firedome

Securing the Connected Future

blog

Top 15 IoT industry events device manufacturers shouldn’t miss

October 06, 2019 by Adir Ben Yehuda

Even in today’s hyper-digital world there are plenty of reasons to get out of the office and shake some hands. For example, you can’t schedule innovation, especially when it comes to a dynamic and rapidly developing industry like IoT. It...

blog

IoT security laws and standards you must know and get ready to adhere to

September 03, 2019 by Shaked Ilan

The past decade has seen many efforts by various governing bodies to define and regulate what cybersecurity means in today’s market. In this article, I will outline the current state of cybersecurity law and standards, as it pertains to the...

blog

Safe trends: Our selection of IoT cybersecurity trends to closely follow in 2019

August 12, 2019 by Shaked Ilan

Truly impactful trends have the power of driving the industry towards specific directions and are therefore closely monitored by top players and influencers. The internet of things (IoT) is an example of a trend that became a massive, rapidly growing...

blog

5 reasons why EDR is becoming a security standard in the IoT devices industry

July 18, 2019 by Sharon Mirsky

Buzzwords come and go. Only a few stick around, and usually because they represent an actual shift in our perception. Has EDR turned into an industry buzzword? Well, if so, it’s been around for quite a while now (some people...

blog

9 IoT Cybersecurity Leaders & Influencers to Follow

June 17, 2019 by Sharon Mirsky

Home IoT is a relatively young industry, and one might think that it’s too early to declare strong expertise in this field. But young industries are often built upon decades of research and are in great need of pioneers to...

blog

Wish Google Cloud IoT Core Had an Emulator? We’ve got you covered

June 03, 2019 by Orr Chen

The Google Cloud IoT core is a fully managed service that connects, manages, and ingests data from globally dispersed devices. But it does not come with a built-in emulator, and we are not sure why. An emulator, as you probably...

blog

Internet of Threats: How hackers make their way into our homes and how manufacturers can stop them

May 14, 2019 by Sharon Mirsky

  When we think of hacking, the image that usually comes to mind is that of hoodie-wearing masterminds entering the holiest and most secure places on the web: the Pentagon, NASA, financial institutes, Iran’s nuclear program or election results. But...

blog

What does the future hold for Home IoT device companies? Thoughts about cybersecurity threats

April 15, 2019 by Sharon Mirsky

First of all, I have nothing against Security by Design. Let’s sort this one right out the gate! My point in this article is that Security by Design on its own is not enough. That’s something I can safely stand...

blog

“Hey Google, can you please hack Alexa”?

April 04, 2019 by Sharon Mirsky

Smart home assistants are pretty popular these days, and for a good reason - they are time-saving, convenient, fun and addictive! Working in the cybersecurity industry and being familiar with the security risks that rely on IoT endpoint devices, I...

blog

Introducing SHEL – Smart Home environment Lab for IoT companies – Gem inside!

March 20, 2019 by Orr Chen

As our journey in the home IoT cybersecurity world evolved, we realized that it is mandatory for us to create a simulation environment for a typical smart home, as most of our clients’ devices reside in such environments. Our idea...