article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? First off, connected vehicles and IoT devices are highly attractive targets to hackers. Unlike servers and devices running in enterprise networks, IoT devices are typically shipped direct to consumers, without any control over the network or environment they run in. Guest Blog: TalkingTrust.

IoT 77
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is rapidly growing and expected to affect all industry verticals as well as our private lives. In this blog, we reached out to our technology partner Nexus to better understand the challenges that the industry faces to ensure safe deployment and management of IoT technologies. Weak authentication.

IoT 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

According to statistica the number of Internet of Things (IoT) devices connected will rise to 23 billion this year. From industrial machinery and intelligent transportation to health monitoring and emergency notification systems, a broad range of IoT devices are already being deployed by enterprises.

IoT 85
article thumbnail

Not the Final Answer on NDR in the Cloud …

Anton on Security

As we discussed during this recent webinar , this is not about competing with endpoint or endlessly arguing about what security telemetry is “better.” To summarize, network security monitoring still matters because you can monitor unmanaged devices (BYOD, IoT, ICS, etc.), Everything is encrypted, so what’s there to sniff??—?We

article thumbnail

Not the Final Answer on NDR in the Cloud …

Security Boulevard

As we discussed during this recent webinar , this is not about competing with endpoint or endlessly arguing about what security telemetry is “better.” To summarize, network security monitoring still matters because you can monitor unmanaged devices (BYOD, IoT, ICS, etc.), Everything is encrypted, so what’s there to sniff??—?We

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. Cloud vendors offer their own recipes for authentication, encryption and key management, but lack of resources and expertise can make it challenging to craft new security policies that govern all.

article thumbnail

WikiLeaks: Many Internet Connected Devices Have Vulnerabilities

SiteLock

Once hackers have control of vulnerable devices, they can spy on users by listening to their conversations through microphones, accessing cameras and capturing text or voice messages by bypassing encryption. When consumers purchase an IoT device, such as a Smart TV, they don’t think about the possibility of it being hacked.