These security predictions are based on industry standards initiatives, represented by organizations involved in the industry, thought leaders, and other stake holders in the security market. While it is fairly safe to predict that some security areas will see improvement in the coming year, others will become more problematic. It is these areas of continuing […]
In mid-February, I participated on a panel focused on securing Internet of Things (IoT) devices in the hospitality industry. This event was sponsored by CLM (Claims and Litigation Management). Have you ever thought about how IoT devices are used in the hospitality industry? They are used in hotels much like their use in smart homes. Think […]
Roughly a quarter billion connected cars will be on our roads by 2020. That’s only two years away and we’re well on our way with 21 million connected cars out there. Already so many of our cars have fascinating features that allow us to get live updates to sports games, traffic, and social media while […]
Thousands of connected devices use default settings, making them vulnerable to attack. You may not think much of this when you’re hurrying to set up a new router without customizing the network or password—after all, we just want to start using our new gadgets. But imagine what happens when hundreds of these internet-connected devices, including […]
With more devices connected to the internet than ever before, we’re all interested in finding out how the latest gadget will make our life easier. But usually, as consumers, the furthest thing from our minds is how a device will stay up-to-date and if there is security built-in. Device manufacturers are more mindful of both […]
That’s one heck of a headline, I know, but things just got real for Wi-Fi security Monday morning. Mathy Vanhoef of imec-DistriNet and Frank Piessens at KU Leuven published the results of their hard work on the authentication mechanism of the WPA2 protocol (which is used by Wi-Fi as a security layer for data traveling […]
This new partnership will accelerate development, increase the speed of innovation, and ensure continuous delivery of certificates for DevOps environments.
We are often blinded by the “awe” factor of new technology. But before jumping in head first, take time to make sure the pros are worth the cons.
According to Gartner, public key infrastructure (PKI) will re-emerge as one of the most relevant mechanisms for organizations to address the IoT authentication problem.