Remove Architecture Remove Authentication Remove Encryption Remove Manufacturing
article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Requirements also included that the firmware was to be signed by the manufacturer and verified by the pacemaker. Tue, 06/01/2021 - 06:55.

IoT 71
article thumbnail

Thales CipherTrust Data Security Platform Support for Intel TDX Confidential VMs on Microsoft Azure Thales, Intel, and Microsoft Azure Deliver End-to-End Data Protection

Thales Cloud Protection & Licensing

To this end, industry collaborations between chip manufacturers, cloud providers and software/hardware providers are building an enhanced trusted ecosystem for end-to-end data protection with confidential computing. Therefore, there is a need to continually raise the bar in cloud security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. Co-ordination is key.

IoT 77
article thumbnail

New DigiCert poll shows companies taking monetary hits due to IoT-related security missteps

The Last Watchdog

Carried out by ReRez Research , DigiCert’s poll queried senior officials at organizations in the fields of healthcare, industrial manufacturing, consumer products and transportation ranging in size from 999 to 10,000 employees. The most common security practices in place at top-tier enterprises were: •Encryption of sensitive data.

IoT 166
article thumbnail

The 2022 ThreatLabz State of Ransomware Report

Security Boulevard

Double-extortion attacks, which include data exfiltration in addition to encryption, are rising even faster at 117% year-over-year. Some industries saw particularly high growth of double-extortion attacks, including healthcare (643%), food service (460%), mining (229%), education (225%), media (200%), and manufacturing (190%).

article thumbnail

Cigent gets $7.6 million to reimagine data protection at the file level

SC Magazine

First, it leverages a solution called Dynamic Data Defense Engine to build in zero trust access policies at the individual file level, encrypting each one and building in a number of ways that employees can authenticate their device or identity before accessing.

article thumbnail

Key Developments in IoT Security

Thales Cloud Protection & Licensing

The good news is that security is no longer being ignored during the manufacturing of the devices. Digital identification would fulfill a critical element of attaining a zero trust architecture, especially important for industrial technology edge devices. Encryption Key Management. To hear more, tune into the podcast.

IoT 100