article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

These certificates leverage something called the public key infrastructure ( PKI ), a framework for encrypting data and authenticating the machines talking to each other. They’ve been quick to recognize that all too many organizations have a limited understanding about these fresh cyber risks.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

” So should analyzing a device’s firmware for security flaws be considered illegal? In 2018, the last review year, breaking encryption in a product in order to repair it was deemed to be legal as well, however, this activity is restricted to restoring the device in question to its original specifications.

InfoSec 52
article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

” So should analyzing a device’s firmware for security flaws be considered illegal? In 2018, the last review year, breaking encryption in a product in order to repair it was deemed to be legal as well, however, this activity is restricted to restoring the device in question to its original specifications.

InfoSec 52