Security of Online Learning

How to avoid Zoom class pranks and data breaches, and keep students safe As a majority of schools and universities move to either 100 percent online or hybrid online and in-person learning this fall, security has become even more important. Just as we saw hackers preying on the public’s heightened awareness when the pandemic began […]

What IoMT Device Manufacturers Can Learn from Smart Home IoT

Many of us feel uneasy thinking about how our connected smart home speakers could be listening in on us, yet we worry less about what information medical devices could be sharing. Personal health information sells for hundreds to thousands of dollars on the black market, while credit cards and social security numbers go for around […]

Infographic: One Million Good Reasons To Invest In Modern PKI

Organizations can save nearly $1 million annually by adopting a cloud-based, fully managed PKI service, according to an IDC study. You probably already know the benefits of adopting modern PKI. Simplicity. Flexibility. Versatility. Managed PKI is increasingly being adopted by companies around the globe for these reasons. Not only does PKI solve a number of […]

Swimming and Healthcare Security—Both Start with Good Mechanics

Swimming Mechanics In the 2016 Rio Olympics, 35-year-old Anthony Ervin captured a gold medal in the 50-meter freestyle, becoming the oldest individual swimming gold medalist. As a swimmer myself, watching Anthony perform so well motivated me to become better at a sport I’ve enjoyed for over 20 years now. So shortly after that, I hired […]

Controlling IoT Authentication Opportunities in the Automotive Industry

I was recently made aware of an article where some security researchers attempted to attack and exploit security vulnerabilities in vehicles through the use of tools and applications designed to access and utilize information on the vehicle network. What struck me as interesting about this article is that there seems to be no end to […]

ETSI Recommendations Echo Global Push for IoT Security

The massively growing number of network-connected devices has pressed standards bodies and government entities to publish security guidelines and recommendations. According to IHS Markit, the number of IoT devices throughout the world will increase from 27 billion in 2017 to 125 billion by 2030. In response to this IoT expansion, recommendations continue to emerge around […]

DigiCert Labs to Explore Categorizing IoT Devices Based on Security, Privacy Using AI and Pattern Recognition Technologies

Today, we are surrounded by devices that can record the surrounding sound without our consent, take pictures without our knowledge and transmit data without our permission. In other words, we are surrounded by digital eyes and ears. Commonly, we categorize these devices as the Internet of Things, or IoT for short. Examples such as Amazon […]

For IBM, identity has become the new perimeter defense.

“The landscape has shifted under our feet. With the rapid adoption of Software as a Service, all the beautiful protections provided by on-premises network security are totally bypassed.” — Weber Yuan, Ph.D, Lead Architect, CIO, Identity Services & Information Security, IBM In the new digital landscape, Software as a Service models are disrupting the traditional […]