Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2022

AI-Based Planning? You Might Want To Double-Check That Data.

AI is awesome! It can do so much for us, much faster and broader than we can do ourselves. All of AI’s benefits are great, assuming the data is trustworthy. Sure, algorithms can detect and remove outliers, but what if your corrupt data does not reside in the outliers? You can only trust the data when you establish trust at the source of the data. How often have we been conversing with a friend who is relaying information from their friend?

Why Ignorance Isn't Bliss in IoT

Why You Need a Credential Manager For Your Devices Before joining Device Authority, I gave my home IoT security exposure very little thought, and I continued to add to it. Now, I have a plethora of devices in my home including, Smart appliances, Wi-Fi lights and sockets, wireless security video, and Wi-Fi-enabled active home power monitoring, to name a few.

Are SASE and Zero Trust the key for manufacturers grappling with IoT cyber risks?

As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses, and across supply chain infrastructure is exploding. Manufacturers seek to utilize IoT in a range of places, be it video camera inspection devices on the assembly line, temperature sensors on refrigeration units, or maintenance telemetry sensors on factory equipment.

How do you measure up on the 9 Core Security Capabilities essential for Zero Trust in IoT?

Machine Identities, Zero Trust….how do these relate to your IoT project? Today’s PKI vendors have specific solutions for managing non-human identities – machines – like servers, laptops, software applications, API’s and other assets found within a corporate network.

What is the Internet of Things (IoT)? Definition and Critical Risks

The internet of things (IoT) is a system of interconnected computers, devices, digital machines, and objects, all marked with unique identifiers (UIDs) and enabled to transfer and share data over a network. It was first coined by Kevin Ashton in 1999 when he envisioned a future where things communicated with each other, apart from human interaction With the evolution of web-enabled smart homes and smart devices in nearly every corner of life, IoT attack surfaces begin to emerge.