This publication describes recommended activities related to cybersecurity that manufacturers should consider performing before their IoT devices are sold to customers. These foundational cybersecurity activities can help manufacturers lessen the cybersecurity-related efforts needed by customers, which in turn can reduce the prevalence and severity of IoT device compromises and the attacks performed using compromised devices.
The Curse of Dimensionality: De-identification Challenges in the Sharing of Highly Dimensional Datasets
De-identifying search query data under GDPR is fraught with risk as high-dimensional behavioural datasets remain vulnerable to re-identification despite technical […]