{"id":10353,"date":"2018-08-22T12:05:33","date_gmt":"2018-08-22T12:05:33","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541875"},"modified":"2018-08-22T12:05:33","modified_gmt":"2018-08-22T12:05:33","slug":"back-to-basics-why-we-need-to-encourage-more-secure-iot-development","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/","title":{"rendered":"Back to Basics: Why We Need to Encourage More Secure IoT Development"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"186\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180416210218372-25-Kh90LvP-800-300x186.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180416210218372-25-Kh90LvP-800-300x186.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180416210218372-25-Kh90LvP-800-768x476.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180416210218372-25-Kh90LvP-800-640x397.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180416210218372-25-Kh90LvP-800-440x273.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180416210218372-25-Kh90LvP-800-380x236.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/08\/20180416210218372-25-Kh90LvP-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>The Internet of Things (IoT) is radically reshaping the way we live and work. Before our very eyes, organizations are becoming more agile, efficient and cost effective to run, all while consumers marvel at the wonders of the smart home, fitness trackers and connected cars. There\u2019s just one major problem: Much of this new infrastructure is wide open to attack and abuse. Securing it will take a major multi-layered effort involving all ecosystem stakeholders.<\/p>\n<p>But it starts with manufacturing the products themselves.<\/p>\n<p>That\u2019s why we recently launched a new program designed to tap our industry-leading expertise in vulnerability research to help IoT manufacturers tackle security threats from step one.<\/p>\n<h3><strong>Threats are everywhere<\/strong><\/h3>\n<p>IoT security issues first broke into the users\u2019 awareness with the Mirai botnet of 2016. Attackers easily took control of tens of thousands of devices by scanning for and logging-in with the factory default credentials. The resulting botnet was used to launch some of the biggest Distributed Denial of Service (DDoS) attacks ever seen, one of which <a href=\"https:\/\/blog.trendmicro.com\/dyn-servers-attacked-hackers-means-iot\/\">temporarily took out<\/a> some of the biggest names on the web. The threat of compromise still persists, with the <a href=\"https:\/\/www.ic3.gov\/media\/2018\/180802.aspx\">FBI recently releasing an alert<\/a> warning of threats to routers, wireless radios, Raspberry Pis, IP cameras, DVRs, NAS devices and even smart garage door openers.<\/p>\n<p>The FBI findings show such devices could be recruited into botnets used to power credential stuffing attacks, click fraud, spam campaigns and more \u2014 as well as being used to help obfuscate the source of malicious traffic. But there are even more threats facing the corporate sphere: Insecure endpoints could be used to infiltrate enterprise networks in data stealing raids or sabotaged to disrupt business processes and factory output.<\/p>\n<p>Normally, when we discover vulnerabilities in products, we advise organizations to patch. But with IoT devices this becomes more problematic. Your typical IoT manufacturer may not be a specialist in software development, so it may not even have a software update mechanism in place. Even if patches can be issued, they may be difficult for end users to apply. This is especially true of large organizations that may be running thousands of IoT endpoints, potentially in mission critical environments that can\u2019t be switched off. Many more may be running without the knowledge of IT, if business owners have bought them for specific tasks.<\/p>\n<h3><strong>The Trend Micro Research difference<\/strong><\/h3>\n<p>In cybersecurity, there\u2019s a well understood rule: It\u2019s cheaper and more effective to fix a problem in the development phase than after it has left the factory. Nowhere is this truer than in IoT, where devices may never be secured once they leave the production line.<\/p>\n<p>That\u2019s why we invite IoT manufacturers to rely on the expertise and experience of Trend Micro Research and the Zero Day Initiative (ZDI). The <a href=\"https:\/\/www.zerodayinitiative.com\/about\/\">ZDI<\/a> has been improving security for 13 years, and today runs the world\u2019s biggest vendor-agnostic bug bounty program, featuring more than 3,500 external researchers contributing to the program. The ZDI offers vendors guidance and best practices in terms of developing vulnerability disclosure processes and patching software flaws. After all, there\u2019s no point in collecting bugs without a clear plan to fix them.<\/p>\n<p>Beyond the ZDI, we invite IoT makers to send us their products for testing by other experts within Trend Micro Research, ramping up security even further. This way we can help evaluate an IoT vendors\u2019 products to identify potential vulnerabilities before they go to market.<\/p>\n<p>It\u2019s just one small step in what needs to be a universal effort involving the security industry, manufacturers, telco operators, developers, standards bodies and even lawmakers. However, it\u2019s vital to get the basics right first by encouraging the production of resilient, security-minded products.<\/p>\n<p><em>So, if you\u2019re a device manufacturer looking to differentiate on security in an increasingly competitive market, get in touch today to see how Trend Micro can help.<\/em><\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) is radically reshaping the way we live and work. Before our very eyes, organizations are becoming more agile, efficient and cost effective to run, all while consumers marvel at the wonders of the smart home, fitness trackers and connected cars. There\u2019s just one major problem: Much of this new infrastructure&#8230;<br \/>\nThe post Back to Basics: Why We Need to Encourage More Secure IoT Development appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":10354,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[35,1055,376,2890,307,308],"class_list":["post-10353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-bug-bounty","tag-ddos","tag-internet-of-things","tag-internet-of-things-iot","tag-security","tag-zero-day-initiative"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Back to Basics: Why We Need to Encourage More Secure IoT Development 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Back to Basics: Why We Need to Encourage More Secure IoT Development 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-22T12:05:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Back to Basics: Why We Need to Encourage More Secure IoT Development\",\"datePublished\":\"2018-08-22T12:05:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg\",\"keywords\":[\"bug bounty\",\"DDoS\",\"Internet of Things\",\"Internet of Things (IoT)\",\"Security\",\"Zero Day Initiative\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/\",\"name\":\"Back to Basics: Why We Need to Encourage More Secure IoT Development 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg\",\"datePublished\":\"2018-08-22T12:05:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg\",\"width\":300,\"height\":186},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"bug bounty\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/bug-bounty\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Back to Basics: Why We Need to Encourage More Secure IoT Development\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Back to Basics: Why We Need to Encourage More Secure IoT Development 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/","og_locale":"en_US","og_type":"article","og_title":"Back to Basics: Why We Need to Encourage More Secure IoT Development 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-08-22T12:05:33+00:00","og_image":[{"width":300,"height":186,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Back to Basics: Why We Need to Encourage More Secure IoT Development","datePublished":"2018-08-22T12:05:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/"},"wordCount":659,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg","keywords":["bug bounty","DDoS","Internet of Things","Internet of Things (IoT)","Security","Zero Day Initiative"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/","url":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/","name":"Back to Basics: Why We Need to Encourage More Secure IoT Development 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg","datePublished":"2018-08-22T12:05:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/08\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development.jpg","width":300,"height":186},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/back-to-basics-why-we-need-to-encourage-more-secure-iot-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"bug bounty","item":"https:\/\/www.threatshub.org\/blog\/tag\/bug-bounty\/"},{"@type":"ListItem","position":3,"name":"Back to Basics: Why We Need to Encourage More Secure IoT Development"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=10353"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/10353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/10354"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=10353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=10353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=10353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}