The DIGIT Act has been reintroduced in the Senate and is legislation that would promote the internet of things (IoT) industry in the US, help define global interoperability standards and technology innovation, while encouraging a secure and interoperable Internet of Things (IoT).A group comprised of federal and private-sector representatives would be created to work to identify the regulations or practices “inhibiting or that could inhibit the development of the Internet-of-Things.” That working group would also identify the policies that would “improve coordination among federal agencies with jurisdiction over the Internet-of-Things.” One of the first initiatives would be to define the Internet of Things. Mike Patterson, CEO at Plixer commented below.
“The very nature of the name “Internet of Things”, demonstrates why the creation of a crisp definition will be difficult. The term IoT represents new “things” that have IP addresses and are connected to the Internet. Distinguishing the devices that fall under new IoT regulations from the devices that have traditionally connected to the Internet, could prove challenging. However, supporting regulation that standardizes security and communication protocols for these new devices is the optimum solution. A collaborative approach including IoT manufacturers as well as the customers who use them, are needed to help mitigate security risks, including DDoS attacks. Beyond this, service providers should be stepping up to take part in solving this problem as well. Service providers can do this by implementing Best Current Practice 38 (BCP38 put forth by the Internet Engineering Taskforce (IETF). BCP38 basically mandates packets should not be allowed to come from a network that doesn’t originate from the assigned address space. This would have an immediate impact on DDoS attacks. In addition, standardization for communication and security protocols will allow the security communication to look for, and identify anomalous IoT device behavior.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.