How to find security gaps in IoT devices

[vc_row][vc_column][vc_column_text]Several serious attacks on IoT devices over the last couple of months have made it clear that the Internet of Things is not safe by default and needs to be secured. But how do you find and fix flaws in IoT devices? In this (German) podcast, Rainer Richter, Director Channels at SEC Technologies GmbH, provides some answers.

Richterrainer Iotinspector SmallThe number of IoT devices is increasing day by day. According to Gartner, 25 billion IoT devices are expected to be connected to the Internet of Things by 2021. Several prominent examples of IoT attacks have led to growing concerns by consumers about (the lack of) security measures for IoT devices. Consequences of such attacks can be serious. Even the EU cybersecurity agency ENISA states: “The Internet of Things will affect every aspect of our lives and we have to be prepared”.

Rainer Richter, and the team of IoT Inspector, have a lot of experience in IoT security. In an interview with Oliver Schonschek, news analyst at Insider Research, Rainer Richter explains how to better protect the IoT, and addresses the following questions:

  • Why is the IoT such a big security challenge?
  • Where does the IoT have the most vulnerabilities?
  • What exactly is the IoT Inspector? How does the IoT Inspector help to secure the IoT?
  • How did the IoT Inspector come about?
  • Who is using the IoT Inspector?
  • How can a provider of IoT solutions make their products safer with the IoT Inspector?
  • How does the IoT Inspector help an IoT user?

The new podcast is available on Soundcloud (in German). Enjoy!





ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of an automated Product Cybersecurity & Compliance Platform (PCCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.

Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access. Proactively audit software supply chains with integrated software bill of materials (SBOM) generation. “Digital Cyber Twins” enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle.

The patent-pending, integrated Compliance Wizard™ already covers the upcoming EU Cyber Resilience Act (CRA) and existing requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others.

The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation.

Leading international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform and ONEKEY Cybersecurity Experts.



Sara Fortmann

Marketing Manager


euromarcom public relations GmbH

+49 611 973 150