Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Symmetric Encryption vs. Asymmetric Encryption? How it Works and Why it's Used

Cybersecurity is a top priority for businesses, governments, and individuals alike. With the rise of cybercrime in recent years, it’s more important than ever to ensure that sensitive data is kept safe and secure. That’s where encryption comes in. Encryption is the process of encoding data so that only authorized users can access it. There are two main types of encryption: symmetric and asymmetric encryption.

The Definitive Guide to Internet of Things (IoT) Privilege Access Management in 2023

According to a recent study, machine identities (IDs) are growing at twice the rate of human identities. To defend these machine identities in the IoT, privilege access management will be one of the most important areas of focus for businesses in the Internet of Things (IoT) space in 2023. As more and more devices are connected to the internet and can share data, it’s becoming increasingly important to make sure that only authorized users have access to sensitive information.

Device Authority and Entrust Demonstrate Their Partnership Potential to Provide Security to the Supply Chain

Identified as leaders in IoT (Internet of Things) Device Identity Lifecycle Management by ABI Research, and leaders in IoT IAM according to Quadrant, Device Authority and Entrust have worked together to integrate Device Authority’s KeyScaler® IoT IAM (Identity and Access Management) platform with PKI (Public Key Infrastructure) services from Entrust, extending the existing collaboration for Hardware Security Module (HSM) services, to provide device trust, data trust and automation at IoT sca

Does Your Organization Meet the 9 Core Capabilities Essential for Zero Trust in IoT?

Every one of your IoT devices has their own machine identity. But how are these identities the key to achieving Zero Trust IoT project? Today’s PKI (Public Key Infrastructure) vendors have specific solutions for managing non-human identities – machines – like servers, laptops, software applications, API’s and other assets found within a corporate network.

10 of the Most Common IoT Hacks and How to Defend Against Them

The Internet of Things (IoT) has revolutionised the way we live and work, connecting devices and systems to the internet and each other to create a more efficient and interconnected world. However, as with any new technology, the IoT comes with its own set of security risks and vulnerabilities. In this blog, we will look at the 10 most common IoT hacks and how to defend against them.

The Future of IoT Security for Axeda Customers

Recently, Device Authority’s CTO James Penney recorded a podcast with Axeda Co-Founder and CTO Jim Hansen. Full disclosure: I was the first Salesperson hired by Axeda in 2001 and I can personally attest that at the time many companies thought we were out of our minds! In the early days, Axeda’s biggest challenge was getting machine makers to use this new thing called the Internet to remotely manage their high value assets in the field.

This ain't' no Ordinary Product Release!

It’s breakthrough and game-changing for Biden’s SBOM and customers’ IoT Edge security and deployment challenges. This week the Device Authority team is proud to be releasing KeyScaler 7.0. This has been a seismic achievement, adding breakthrough features based on customer demand, as we advance our Product Led Growth Strategy to solve the Zero Trust for IoT security challenges. Device Authority’s breakthrough KeyScaler 7.0 release includes advanced Edge and SBOM capabilities.

What Is An IoT Device Security Platform? A Guide to What To Look For When Choosing An Enterprise Solution

As the number of IoT devices grows, predicted “to reach 27 billion or more by 2025 (IDC, IoT Analytics)”, so does the need for IoT device management companies and security solutions. While there are many benefits to the IoT, there are also security risks that come along with it. Gartner estimates that “75% of security failures will result from inadequate management of identities, access, and privileges” by 2023.