IoT security needs to address improper device access control, lack of network security, and how to stop bad actors from stealing sensitive data.
Black Hat 2014 reminded us to think considerably more about security implications, and take an activate stance in support of data safety and user privacy.
Forward Secrecy ensures that any previously secure communication that has already taken place remains secure from future security threats.
Phishing scams have evolved into fake customer support portals stealing user logins to attack enterprise networks and steal valuable resources.
More customer service kiosks, self-service portals, and customer contact channels increases the exposure of personal information and raises the risk of data falling into the wrong hands.
New standards for secure information exchange is enabling compliance with federal health information requirements that previous technologies can’t offer.
Half of apps tested do not validate the authenticity of the SSL Certificates being presented or the identify of the organization using the certificate.
Organizations relying on cloud service providers should only trust and exchange data using high assurance SSL encryption and identity assurance.