{"id":47187,"date":"2022-06-21T06:00:00","date_gmt":"2022-06-21T06:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=115938"},"modified":"2022-06-21T06:00:00","modified_gmt":"2022-06-21T06:00:00","slug":"securing-your-iot-with-edge-secured-core-devices","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/","title":{"rendered":"Securing your IoT with Edge Secured-core devices"},"content":{"rendered":"<p>A <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/08\/new-research-shows-iot-and-ot-innovation-is-critical-to-business-but-comes-with-significant-risks\/\">recent study<\/a> conducted by Microsoft in partnership with Ponemon Institute included a survey of companies that have adopted IoT solutions and 65 percent of them mentioned that security is a top priority when implementing IoT. Attacks targeting IoT devices put businesses at risk. Impacted devices can be bricked, held for ransom, employed as launch points for further network attacks, or used for malicious purposes. Among many consequences, we often see intellectual property (IP) and data theft and compromised regulatory status, all of which can have brand and financial implications on the business.&nbsp;<\/p>\n<p>Subsequently, we did a survey to understand the top concerns around the security of IoT devices, and we shared the findings in a previous blog about <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/04\/25\/microsoft-best-practices-for-managing-iot-security-concerns\/\">best practices for managing IoT security concerns<\/a>. The following list summarizes the top security concerns from companies that have adopted IoT solutions:<\/p>\n<ul>\n<li>Ensuring data privacy (46 percent).<\/li>\n<li>Ensuring network-level security (40 percent).<\/li>\n<li>Security endpoints for each IoT device (39 percent).<\/li>\n<li>Tracking and managing each IoT device (36 percent).<\/li>\n<li>Making sure all existing software is updated (35 percent).<\/li>\n<li>Updating firmware and other software on devices (34 percent).<\/li>\n<li>Performing hardware\/software tests and device evaluation (34 percent).<\/li>\n<li>Updating encryption protocols (34 percent).<\/li>\n<li>Conducting comprehensive training programs for employees involved in IoT environment (33 percent).<\/li>\n<li>Securely provisioning devices (33 percent).<\/li>\n<li>Shifting from device-level to identity-level control (29 percent).<\/li>\n<li>Changing default passwords and credentials (29 percent).<\/li>\n<\/ul>\n<p>To help address these concerns, Microsoft is thrilled to announce today the general availability of the extension of our Secured-core platform to IoT devices along with new Edge Secured-core certified devices from our partners Aaeon, Asus, Lenovo and Intel in the Azure certified device catalog. We have added this new device certification for our Edge Secured-core platform so customers can more easily select IoT devices that meet this advanced security designation. \u202f&nbsp;<\/p>\n<p>As outlined in <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWJJdT\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s Zero Trust paper<\/a>,&nbsp;a key investment, especially around new devices, is to choose devices with built-in security. Devices built with <a href=\"https:\/\/azure.microsoft.com\/services\/azure-sphere\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Sphere<\/a> benefit from industry-leading built-in security, with servicing by Microsoft.<\/p>\n<h2>Announcements for Edge Secured-core<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/\">Edge Secured-core<\/a> is a certification in the Azure Certified Device program for IoT devices. Devices that have achieved this certification provide enterprises the confidence that the devices they\u2019re purchasing deliver the following security benefits:<\/p>\n<ul>\n<li>Hardware-based device identity: In addition to the various security properties that a hardware-based device identity provides, this also enables the use of the hardware-backed identity when connecting to Azure IoT Hub and using the IoT Hub device provisioning service.&nbsp;&nbsp;<\/li>\n<li>Capable of enforcing system integrity: Using a combination of processor, firmware, and OS support to facilitate measurement of system integrity to help ensure the device works well with Microsoft Azure Attestation.<\/li>\n<li>Stays up-to-date and is remotely manageable: Receives the necessary device updates for a period of at least 60 months from the date of submission.<\/li>\n<li>Provides data-at-rest encryption: The device provides built-in support for encrypting the data at rest using up-to-date protocols and algorithms.<\/li>\n<li>Provides data-in-transit encryption: IoT devices such as gateways, which are often used to connect downstream devices to the cloud, need inherent support for protecting data in transit. Edge Secured-core devices help support up-to-date protocols and algorithms that are used for data-in-transit encryption.<\/li>\n<li>Built-in security agent and hardening: Edge Secured-core devices are hardened to help reduce the attack surface and include a built-in security agent to help secure from threats.<\/li>\n<\/ul>\n<p>In addition to addressing many of the top concerns that we\u2019ve heard from customers around the security of their IoT devices, our data shows that <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/04\/05\/new-security-features-for-windows-11-will-help-protect-hybrid-work\/\">Secured-core PCs are 60 percent more resilient to malware<\/a> than PCs that don\u2019t meet the Secured-core specifications. We\u2019ve brought the learnings from Secured-core PCs to define the requirements for Edge secured-core devices.<\/p>\n<p>Today, we\u2019re excited to announce the availability of <a href=\"https:\/\/devicecatalog.azure.com\/devices?certificationBadgeTypes=IotSecureCore\">Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog<\/a>.<\/p>\n<figure class=\"wp-container-2 wp-block-gallery-1 wp-block-gallery has-nested-images columns-4\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"4018\" height=\"1442\" data-id=\"116469\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN.png\" alt=\"Asus logo\" class=\"wp-image-116469\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN.png 4018w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN-300x108.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN-1024x367.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN-768x276.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN-1536x551.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN-2048x735.png 2048w\" sizes=\"auto, (max-width: 4018px) 100vw, 4018px\"><\/figure>\n<figure class=\"wp-block-image size-medium\"><img decoding=\"async\" loading=\"lazy\" width=\"1187\" height=\"396\" data-id=\"116241\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/LenovoLogo-POS-Red-jpg.jpg\" alt=\"Lenovo logo\" class=\"wp-image-116241\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/LenovoLogo-POS-Red-jpg.jpg 1187w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/LenovoLogo-POS-Red-jpg-300x100.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/LenovoLogo-POS-Red-jpg-1024x342.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/LenovoLogo-POS-Red-jpg-768x256.jpg 768w\" sizes=\"auto, (max-width: 1187px) 100vw, 1187px\"><\/figure>\n<figure class=\"wp-block-image size-medium\"><img decoding=\"async\" loading=\"lazy\" width=\"401\" height=\"167\" data-id=\"116235\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Intel_logo_unboxed_091620.png\" alt=\"Intel logo\" class=\"wp-image-116235\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Intel_logo_unboxed_091620.png 401w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Intel_logo_unboxed_091620-300x125.png 300w\" sizes=\"auto, (max-width: 401px) 100vw, 401px\"><\/figure>\n<figure class=\"wp-block-image size-medium\"><img decoding=\"async\" loading=\"lazy\" width=\"724\" height=\"283\" data-id=\"116307\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/AAEON.jpg\" alt=\"AAEON logo\" class=\"wp-image-116307\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/AAEON.jpg 724w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/AAEON-300x117.jpg 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\"><\/figure>\n<\/figure>\n<figure class=\"wp-block-table\"><\/figure>\n<p>Additionally, Microsoft invests with semiconductor partners to build IoT-connected industry certified <a href=\"https:\/\/aka.ms\/msft-mcu-security\" target=\"_blank\" rel=\"noreferrer noopener\">MCU security platforms<\/a> that align with Microsoft\u2019s security standards.&nbsp;&nbsp;<\/p>\n<h2>Get started with Microsoft Security<\/h2>\n<p><a href=\"mailto:aepiotsec@microsoft.com?subject=IoT%20security\">Email us<\/a> to request a call for more information about Azure Sphere, Edge Secured-core devices, or industry-certified devices. Learn more about <a href=\"https:\/\/azure.microsoft.com\/en-us\/overview\/iot\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure IoT security<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/06\/20\/securing-your-iot-devices-with-edge-secured-core-devices\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To simplify your IoT security journey, today, we\u2019re announcing the availability of Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog from Lenovo, ASUS and AAEON, additionally we\u2019re also announcing the availability of devices that meet the Microsoft sponsored Edge Compute Node protection profile which is governed with industry oversight, from Scalys and Eurotech. And learn more on Microsoft\u2019s investments in MCU security.<br \/>\nThe post Securing your IoT with Edge Secured-core devices appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":47188,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,77],"class_list":["post-47187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-iot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing your IoT with Edge Secured-core devices 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing your IoT with Edge Secured-core devices 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-21T06:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Securing your IoT with Edge Secured-core devices\",\"datePublished\":\"2022-06-21T06:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/\"},\"wordCount\":736,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/securing-your-iot-with-edge-secured-core-devices.png\",\"keywords\":[\"Cybersecurity\",\"IoT\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/\",\"name\":\"Securing your IoT with Edge Secured-core devices 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/securing-your-iot-with-edge-secured-core-devices.png\",\"datePublished\":\"2022-06-21T06:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/securing-your-iot-with-edge-secured-core-devices.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/securing-your-iot-with-edge-secured-core-devices.png\",\"width\":4018,\"height\":1442},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-your-iot-with-edge-secured-core-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing your IoT with Edge Secured-core devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing your IoT with Edge Secured-core devices 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/","og_locale":"en_US","og_type":"article","og_title":"Securing your IoT with Edge Secured-core devices 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-21T06:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/ASUS-GREEN.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Securing your IoT with Edge Secured-core devices","datePublished":"2022-06-21T06:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/"},"wordCount":736,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/securing-your-iot-with-edge-secured-core-devices.png","keywords":["Cybersecurity","IoT"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/","url":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/","name":"Securing your IoT with Edge Secured-core devices 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/securing-your-iot-with-edge-secured-core-devices.png","datePublished":"2022-06-21T06:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/securing-your-iot-with-edge-secured-core-devices.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/06\/securing-your-iot-with-edge-secured-core-devices.png","width":4018,"height":1442},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/securing-your-iot-with-edge-secured-core-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Securing your IoT with Edge Secured-core devices"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47187"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47187\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/47188"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}