article thumbnail

IoT devices have serious security deficiencies due to bad random number generation

CSO Magazine

These are used for authentication, encryption, access control and many other aspects of modern security and they all require cryptographically secure random numbers -- sequences of numbers or symbols that are chosen in a way that's unpredictable by an attacker. Get the latest from CSO by signing up for our newsletters. ]

CSO 138
article thumbnail

Virtru launches open-source project OpenTDF

CSO Magazine

Data protection provider Virtru is expanding its portfolio of encryption and privacy applications with the launch of its OpenTDF project , an open-source initiative to enable a universal standard for data control. To read this article in full, please click here

IoT 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to choose a certificate management tool

CSO Magazine

While the IT version may not be as entertaining as what was discussed in that song, there are still important reasons to understand your corporate encryption secrets and how they are provisioned, managed and deployed.

article thumbnail

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

The Last Watchdog

Related: Why government encryption backdoors should never be normalized. Machine identities are what make hybrid business networks possible; they are nothing less than the key to stitching together emerging IoT- and 5G-centric systems. At the end of the day the CSO the CIO and the CEO all left the company.

Marketing 133
article thumbnail

Preparing your business for the quantum security threat: Part I

Thales Cloud Protection & Licensing

Originally published on CSO. With the private key, attackers can masquerade as the victim by signing documents or decrypting confidential messages encrypted under the victim’s public key. While scientists may rejoice at the idea of large-scale quantum computing, CISOs are right to feel nervous.

CISO 67
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

This makes it more difficult to hack, as no one knows the password and it will be encrypted in a deeply secured vault.”. You can enable root access, but you have to jump through a lot of security hoops just to activate it,” noted Terry Dunlap, CSO and co-founder at ReFirm Labs. This is a design failure,” agreed Kulkarni. “It

article thumbnail

Theme of Cooperation Resounds at 10th Annual Denver Conference

SecureWorld News

It could be your IT systems, your operation technology, your IoT, your industrial control systems, or SCADA environments.". Taking healthcare as a use case, Rubin said healthcare data for about 300 million Americans is encrypted and riding on the back of a Thales protection plan. That encryption is absolutely critical.

CISO 75