Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Device Authority

How to Master Security Identity and Access Management (IAM)

Security identity and access management (IAM) is crucial for protecting digital identities and controlling access to sensitive resources. This guide covers the importance of IAM, its key components, and how to enhance security through methods like role-based access control and multi-factor authentication.

How to Master Data Management in IoT: Tips and Techniques

Effective data management in IoT is essential for leveraging the vast data generated by interconnected devices. This article provides practical tips on collecting, processing, storing, and securing IoT data. Discover how to overcome challenges like scalability and data quality and implement strategies for better decision-making and operational efficiency.

Past, Present, and Future of IoT/OT Security in Automotive Cybersecurity

At the Device Authority Virtual Summit, Kaivan Karimi discussed how, as IoT and OT ecosystems grow more intertwined, especially within the automotive industry, the stakes in cybersecurity have never been higher. Connected vehicles, once a novel innovation, are now mission-critical infrastructure vulnerable to advanced threats.

The Quantum Horizon: Shaping the Future of IoT/OT Cybersecurity

The rapid evolution of the Internet of Things (IoT) and Operational Technology (OT) is transforming industries, especially in critical sectors like healthcare. While these innovations promise enhanced efficiency and connectivity, they also expose organisations to a broader and more complex cybersecurity threat landscape. With quantum computing on the horizon, the stakes have never been higher.

IoT/OT Security: From Past Lessons to a Secure Future

As we embrace a connected world where machines have literal and figurative voices, we stand at the confluence of opportunity and responsibility. The IoT and OT landscape continues to evolve rapidly, bridging the physical and digital worlds. However, as Miguel Morales aptly highlighted during the Device Authority Virtual Summit 2024, the promise of IoT hinges on one critical factor: trust.

Securing the Future of Automotive Cybersecurity: The Past, Present, and Future of IoT/OT Security

The landscape of connected vehicles is evolving at a breakneck pace. From software-defined vehicles (SDVs) to autonomous driving, the automotive industry has become a nexus for innovation and vulnerability. As Ran Ish-Shalom, Chief Product Officer at Argus Cyber Security, aptly stated during a recent session: Brian Carpenter from CyberArk reinforced this, emphasising the growing complexity of managing identities across both human and machine ecosystems.

The Evolution of IoT/OT Security: A Prescription for Resilience in Healthcare

The intersection of IoT (Internet of Things) and OT (Operational Technology) in healthcare has become a focal point in securing critical infrastructure. With the industry accounting for 9% of global GDP and integrating thousands of devices, from bedside monitors to surgical robots, the stakes couldn’t be higher. The journey from isolated systems to hyper-connected healthcare environments has unlocked unparalleled efficiency and innovation. Yet, it has also introduced unprecedented security risks.

Securing IoT Device Lifecycle Management: Best Practices for Each Stage

As organisations increasingly rely on IoT devices for operational efficiency and data collection, managing each device securely throughout its lifecycle becomes crucial. IoT Device Lifecycle Management (DLM) is a structured approach to securing IoT devices from their initial setup through to decommissioning. By implementing best practices for each stage, organisations can reduce security risks, ensure data protection, and maintain compliance with regulatory standards.

Water Barghest: A Stark Reminder of IoT Security Gaps

Trend Micro’s recent report on the Water Barghest threat actor underlines a critical issue that has long plagued the IoT ecosystem: the security shortcomings inherent in many connected devices. With over 20,000 IoT devices compromised and exploited as residential proxies within minutes, this story highlights the growing risks posed by insecure IoT devices and the urgent need for proactive security measures.