3 Steps: Cyber Breach Recovery Plan to Minimize Loss of Sales – Based on Verkada Breach
The Verkada Breach had a devastating impact on the company’s reputation, we provide 3 steps to minimize the business damage.
“Hey Google, can you please hack Alexa”?
A closer look at the allegedly reliable and safe enterprise-produced devices before connecting them to a home LAN.
P2P Hole punching in Home IoT – A best UX or a built in security vulnerability?
Hole punching technique in home IoT allows smooth user experience but creates security vulnerabilities.
A Fresh View on Home Network (in)Security
Let’s talk about home network security. There’s a lot of confusion surrounding the security of the private home LAN. In this post, we will shatter the security myth and demonstrate how IoT devices are easily hackable even...
The Illusion of Security By Design
Security by design, an approach that seeks to make systems free from vulnerabilities during product design, is gaining popularity in the IoT world. Setting a strong security foundation and designing for privacy is necessary. However, this is just the...
The Story of Firedome
We are Firedome, and earlier this year we embarked on a mission to spread security across the home IoT industry. Over the last few years, this industry has been rapidly assimilated into our lives with very little security in mind....