article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. Read the whole entry. »

IoT 98
article thumbnail

IoT devices have serious security deficiencies due to bad random number generation

CSO Magazine

These are used for authentication, encryption, access control and many other aspects of modern security and they all require cryptographically secure random numbers -- sequences of numbers or symbols that are chosen in a way that's unpredictable by an attacker. Get the latest from CSO by signing up for our newsletters. ]

CSO 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA warns of attacks against internet-connected UPS devices

CSO Magazine

UPS devices, in recent years, have received IoT upgrades, according to CISA – the idea being to allow users to control them remotely via the internet. However, like many other IoT devices, some UPSs have serious flaws in their security and authentication systems, which attackers have exploited to gain illicit access to them.

article thumbnail

BrandPost: A Guide to Certificate Lifecycle Management: Benefits and Use Cases

CSO Magazine

Cloud adoption, digital transformation initiatives, remote work environments, automation, IoT, and other factors have driven a sharp rise in the volume of digital certificates that organizations must manage.

article thumbnail

How Machine Identities Can Imperil Enterprise Security

eSecurity Planet

Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Coffing notes that the recently discovered ThroughTek Kalay vulnerability compromised 83 million IoT devices , which better machine identity management could have prevented. This should come as no surprise.

IoT 117
article thumbnail

How to choose a certificate management tool

CSO Magazine

These secrets are found all over the IT map, including those for servers, for applications, to encrypt your email messages, for authenticating to connect with IoT devices, to allow you to make edits to a piece of code, and for user identities to have access to a particular shared resource.

article thumbnail

How to build a zero trust ecosystem

SC Magazine

Trusted identities are separate authentication and authorization planes that make up the overall trust of a user, their devices, and their access. James Carder, LogRhythm CSO. Examples of identity types are the user, device, applications, data, network traffic and behaviors.

CISO 134