Remove Authentication Remove Computers and Electronics Remove Firmware Remove Risk
article thumbnail

Enhance your security posture by detecting risks on authenticator devices

Thales Cloud Protection & Licensing

Enhance your security posture by detecting risks on authenticator devices. Not only are mobile devices used as end points to access corporate mail and other enterprise applications, they are also frequently used as authentication devices. Limited visibility on users’ devices can undermine authentication integrity.

article thumbnail

Enhance your security posture by detecting risks on authenticator devices

Thales Cloud Protection & Licensing

Enhance your security posture by detecting risks on authenticator devices. Not only are mobile devices used as end points to access corporate mail and other enterprise applications, they are also frequently used as authentication devices. Limited visibility on users’ devices can undermine authentication integrity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MITRE, CISA Reveal Dangerous Hardware & Software Vulnerabilities

eSecurity Planet

Hackers can exploit these weaknesses to compromise computer systems, exfiltrate data, and even perform DDoS attacks. CWE-1240 : Use of a Cryptographic Primitive with a Risky Implementation – non-standard cryptographic implementation is pretty hard to fix and puts the whole system at risk. The full MITRE-CWE list.

Software 109
article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Requirements also included that the firmware was to be signed by the manufacturer and verified by the pacemaker.

IoT 71
article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

In an amendment to the EU’s 2014 Radio Equipment Directive (RED), the European Commission noted that as wireless devices, from mobile phones to fitness trackers to smart watches, become increasingly embedded into everyday consumer and business life, they also become a greater security risk. Also read: IoT Devices a Huge Risk to Enterprises.

Wireless 100
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

The problem becomes – how do we make sure we’re securing these “driving data centers” against the risks and threats that lurk on the Internet? There is also less hardware and compute power to work in your typical IoT device when compared to traditional devices, so embedding security becomes a matter of choice, rather than necessity.

IoT 77
article thumbnail

The Internet of Things: Security Risks Concerns

Spinone

The Internet of Things (IoT) is a term used to describe the network of interconnected electronic devices with “smart” technology. The Security Risks of IoT Devices Every piece of hardware and software that you use and is connected to the internet has the potential to be accessed by cybercriminals.