<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Internet of Things</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Internet of Things</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/internet-of-things/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 16 Jun 2025 00:00:00 -0400</lastBuildDate><item><title>Radio Frequency 101: Can You Really Hack a Radio Signal?</title><link>https://www.sei.cmu.edu/blog/radio-frequency-101-can-you-really-hack-a-radio-signal/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Recent reports indicate the DoD is susceptible to radio frequency (RF) attacks. This post discusses common RF tools and ways malicious actors can attack systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Roxxanne White, Michael Bragg</dc:creator><pubDate>Mon, 16 Jun 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/radio-frequency-101-can-you-really-hack-a-radio-signal/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Internet of Things</category></item><item><title>Internet-of-Things (IoT) Security at the Edge</title><link>https://www.sei.cmu.edu/blog/internet-of-things-iot-security-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Assuring the security of any hardware device is a hard problem. In particular, Internet-of-Things (IoT) devices have increasingly been the target of malicious attacks.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sebastián Echeverría, Grace Lewis</dc:creator><pubDate>Mon, 04 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/internet-of-things-iot-security-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Internet of Things</category></item><item><title>KalKi: Solution for High Assurance Software-Defined IoT Security</title><link>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Commercial Internet of things (IoT) devices are evolving rapidly, providing new and potentially useful capabilities. These devices can be a valuable source of data....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sebastián Echeverría</dc:creator><pubDate>Mon, 15 Jun 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category><category>Internet of Things</category></item><item><title>Using the SEI CERT Coding Standards to Improve Security of the Internet of Things</title><link>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The Internet of Things (IoT) is insecure. The Jeep hack received a lot of publicity, and there are various ways to hack ATMs, with incidents occurring with increasing regularity....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Svoboda</dc:creator><pubDate>Mon, 11 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/using-the-sei-cert-coding-standards-to-improve-security-of-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security-Related Requirements</category><category>Secure Coding</category><category>Secure Development</category><category>Cyber Missions</category><category>Internet of Things</category></item><item><title>Governing the Internet of Things (IoT)</title><link>https://www.sei.cmu.edu/blog/governing-the-internet-of-things-iot/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Explore challenges organizations may face when adopting Internet of Things (IoT) technologies and approaches they can use to reduce risk in this SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Katie Stewart</dc:creator><pubDate>Wed, 20 Dec 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/governing-the-internet-of-things-iot/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Internet of Things</category><category>Insider Threat</category><category>Cyber Missions</category></item><item><title>Coordinating Vulnerabilities in IoT Devices</title><link>https://www.sei.cmu.edu/blog/coordinating-vulnerabilities-iot-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The CERT Coordination Center (CERT/CC) has been receiving an increasing number of vulnerability reports regarding Internet of Things devices and other embedded systems....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Klinedinst</dc:creator><pubDate>Wed, 27 Jan 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/coordinating-vulnerabilities-iot-devices/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Internet of Things</category><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>CERT/CC</category></item><item><title>CVSS and the Internet of Things</title><link>https://www.sei.cmu.edu/blog/cvss-and-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>There has been a lot of press recently about security in Internet of Things (IoT) devices and other non-traditional computing environments....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dan Klinedinst</dc:creator><pubDate>Wed, 02 Sep 2015 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cvss-and-the-internet-of-things/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Internet of Things</category><category>Vulnerability Analysis</category><category>Security Vulnerabilities</category><category>CERT/CC</category></item></channel></rss>