Remove Authentication Remove CSO Remove IoT
article thumbnail

IoT devices have serious security deficiencies due to bad random number generation

CSO Magazine

These are used for authentication, encryption, access control and many other aspects of modern security and they all require cryptographically secure random numbers -- sequences of numbers or symbols that are chosen in a way that's unpredictable by an attacker. Get the latest from CSO by signing up for our newsletters. ]

CSO 138
article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. Read the whole entry. »

IoT 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Machine Identities Can Imperil Enterprise Security

eSecurity Planet

Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Coffing notes that the recently discovered ThroughTek Kalay vulnerability compromised 83 million IoT devices , which better machine identity management could have prevented. This should come as no surprise.

IoT 120
article thumbnail

How to build a zero trust ecosystem

SC Magazine

Trusted identities are separate authentication and authorization planes that make up the overall trust of a user, their devices, and their access. James Carder, LogRhythm CSO. Examples of identity types are the user, device, applications, data, network traffic and behaviors.

CISO 134
article thumbnail

CISA warns of attacks against internet-connected UPS devices

CSO Magazine

UPS devices, in recent years, have received IoT upgrades, according to CISA – the idea being to allow users to control them remotely via the internet. However, like many other IoT devices, some UPSs have serious flaws in their security and authentication systems, which attackers have exploited to gain illicit access to them.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

At the very least, there should have been some form of multi-factor authentication or password vault to protect the [server] account. There is no reason why this functionality should exist for general users of the product, especially without some sort of heightened credentials or multi-factor authentication.

article thumbnail

Cybersecurity First: #BeCyberSmart at Work and Home

Security Through Education

In fact, the IoT market was due to reach 31 billion connected devices in 2020 and is estimated to reach 75 billion IoT devices by 2025. Typically, corporate networks are equipped with firewalls, a Chief Security Officer (CSO), and a whole cybersecurity department to keep them safe.