End-to-End IoT Device Security: What You Need to Know

|
In the course of reading this article, you’ll likely interact with several connected devices. And you probably wouldn’t have even given it a second thought if we hadn’t just called it out ... Read More

What is Secure Boot? It’s Where IoT Security Starts | Keyfactor

Connected IoT devices can be found in every aspect of modern digital life. From autonomous and connected vehicles to medical devices to smart meters and smartwatches. The data generated and the processes controlled by these devices have never been greater.  Because of their importance, the need to prioritize the security ... Read More

TalkingTrust with Thales: IoT Security with Keyfactor

| | IoT Security
This blog recaps TalkingTrust with Thales, an interview between Ellen Boehm, VP of IoT Strategy and Solutions at Keyfactor, and Dave Madden, Senior Director of Business Development at Thales.  ... Read More

Using Digital Certificates for IoT Root of Trust

|
IoT implementations share common security requirements: a trusted device identity, data confidentiality, and integrity of data and firmware running on the device. These translate into authentication, encryption and code signing ... Read More

Top 10 Best Practices for Zero Trust IoT Manufacturing

|
Internet of things (IoT) and industrial control system (ICS) devices are especially vulnerable to cyber-attacks due to weak security controls and vulnerabilities in the manufacturing supply chain. For example, automotive electronic control units (ECUs), the devices that control in-vehicle safety, drive train, and infotainment systems, are often manufactured in a ... Read More

The Top IoT Vulnerabilities in Your Devices – Keyfactor

|
IoT devices make up 30% of all network-connected endpoints (not including mobile devices), making many companies the primary targets for cybercriminals ... Read More

The Top Internet of Things (IoT) Authentication Methods and Options

Gartner recently labeled Internet of Things Authentication as a high benefit in 2020 Gartner Hype Cycle for IAM Technologies. This blog covers your options for Internet of Things Authentication ... Read More

[Webinar Recap] Using Zero Trust Manufacturing for Supply Chains

| | Zero Trust Manufacturing
With so many supply chain partners, the reality is that you cannot trust the manufacturing process’s security to ensure that the hardware, firmware, or credentials of the device were not altered ... Read More

The State of PKI & IoT Security | Keyfactor

The world of IoT has continued to rapidly expand, and as product innovators bring connected devices to market, the risk of device hacks and data theft continue to rise. Faster product development and feature delivery often take priority, leading to increased IoT security risks ... Read More

Top 5 Ways to Secure IoT Devices With PKI

There’s a lot of connected devices out there. That may seem like an obvious statement given that everyone seems to be walking around with a mobile phone, tablet, computer, and wireless headset. But what about all the devices that aren’t entertainment based? I’m thinking about all the connected vehicles, medical ... Read More