Mad Irish . net en Principles of IoT Security Principles to consider when designing, testing, and deploying Internet of Things (IoT) systems. IoT Framework Security Considerations Designing a secure IoT solution depends on a number of security considerations. One of the most important consideration is the use of a secure IoT framework for building your ecosystem. Using a secure framework ensures that developers don't overlook security considerations and allows for rapid application development. Ideally a framework contains security components baked into the framework in such a way as to provide security by default that developers don't have to think about. This frees developers and architects to focus on features and capabilities without burdening their development efforts with security considerations (or mistakes). Utilizing Client Side x509 Cryptographic Certificates Establish bi-directional trust using x509 cryptographic certificates on a client to allow for mutual authentication. AES Encryption with Java This article provides a short tutorial on using initialization vectors properly when using AES encryption within the Java cryptographic library. Code examples show the importance of a random, distinct initialization vector and how to perform encryption and decryption of data using the initialization vector. Adding Depth to WebApp Defense Web application defense often begins with patching vulnerabilities like SQL injection and cross site scripting in the source code. Often times, however, administrators are responsible for deploying and maintaining applications with unknown source code quality and may not be able to audit or fix the source code. In situations like this administrators should assume that applications contain vulnerabilities and apply additional defensive measures to ensure that application compromises are contained. iThoughts Multiple Vulnerabilities iThoughts iOS application for iPhone and iPad contains numerious vulnerabilities.