article thumbnail

Two NSA Algorithms Rejected by the ISO

Schneier on Security

The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices. The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors.

IoT 164
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. The next day I cut the string, There's a parallel here to IoT light bulbs that change colors. And what then are the tools and knowledge that you need to get started hacking IoT devices.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. The next day I cut the string, There's a parallel here to IoT light bulbs that change colors. And what then are the tools and knowledge that you need to get started hacking IoT devices.

IoT 52
article thumbnail

RSA 2022 Musings: The Past and The Future of Security

Anton on Security

Data security : it has happened for a few years, but somehow data security (whether encryption or DLP or some new space) has been less noisy lately, nobody seems to be disrupting it. IoT/OT security : very few, very small vendors focus there, and some who used to are pivoting away. So still no money in it? RSA 2017: What’s The Theme?

VPN 189
article thumbnail

Protecting Endpoints in an Evolving Threat Landscape

Centraleyes

Gartner introduced this category in 2013, recognizing the imperative for tools that could provide visibility into the often overlooked endpoints within a network. Examples include computers, laptops, printers, smartphones, tablets, servers, and IoT devices.

article thumbnail

How to Manage IAM Compliance and Audits

Centraleyes

The HIPAA Omnibus Rule was introduced in 2013 and updates HIPAA’s data protection regulations. Administrators can grant access rights to employees and operate IoT sensors used in healthcare devices. Implementing data encryption and tokenization to safeguard consumer data at rest and in transit under SOC 2 standards.

article thumbnail

RSA 2022 Musings: The Past and The Future of Security

Security Boulevard

Data security : it has happened for a few years, but somehow data security (whether encryption or DLP or some new space) has been less noisy lately, nobody seems to be disrupting it. IoT/OT security : very few, very small vendors focus there, and some who used to are pivoting away. RSA 2013 and Endpoint Agent Re-Emergence.

VPN 113