Capitol Hill at sunset

'Cyber Shield Act’ Aims To Establish Cybersecurity Standards for IoT Devices

The bill, introduced by Democratic legislators on Tuesday, would direct a committee to create security benchmarks and then give labels to products who meet those standards.

Under a bill proposed by Democratic legislators in the House and Senate on Tuesday, a committee would establish “cyber benchmarks” for internet-connected devices posing security risks to companies and organizations.

IoT devices have been the subject of increased scrutiny as more workers use their personal laptops and cell phones to complete business tasks, many of which contain sensitive information. The Cyber Shield Act, reintroduced by Sen. Ed Markey of Massachusetts and Rep. Ted Lieu of California after it failed to gain traction in 2017, hopes to create a set of standards for the Internet of Things.

An advisory committee including cybersecurity experts from the federal government, business and academia would come together to develop the benchmarks. From there, products like baby monitors, printers, phones and computers can be manufactured to meet those benchmarks and earn a “Cyber Shield” label to show they have met the cybersecurity standards, The Hill reported.

“We can’t ignore data security while we encourage technological advancement in every sector of our lives,” Lieu said in a statement.

He added that the legislation would empower consumers to purchase products that keep their data safe and reward businesses who prioritize customer privacy. Multiple advocacy groups have endorsed the bill, including the Internet Association and Public Citizen. Software companies Rapid7 and Cybereason have also put their support behind the legislation, according to The Hill.

The massive growth of IoT devices and increasing reports of cybersecurity breaches were the main drivers behind the legislation. Some estimates project that there will be over 75 billion IoT devices in use around the world by 2025.

“The IoT will also stand for the Internet of Threats until we put in place appropriate cybersecurity safeguards,” Markey said in a statement. “By creating a cybersecurity certification program, the Cyber Shield Act will give consumers a seal of approval for more secure products, as well as encourage manufacturers to adopt the best cybersecurity practices so they can compete in the marketplace for safety."

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.