End-to-End IoT Device Security: What You Need to Know
In the course of reading this article, you’ll likely interact with several connected devices. And you probably wouldn’t have even given it a second thought if we hadn’t just called it out ... Read More
What is Secure Boot? It’s Where IoT Security Starts | Keyfactor
Connected IoT devices can be found in every aspect of modern digital life. From autonomous and connected vehicles to medical devices to smart meters and smartwatches. The data generated and the processes controlled by these devices have never been greater. Because of their importance, the need to prioritize the security ... Read More
TalkingTrust with Thales: IoT Security with Keyfactor
This blog recaps TalkingTrust with Thales, an interview between Ellen Boehm, VP of IoT Strategy and Solutions at Keyfactor, and Dave Madden, Senior Director of Business Development at Thales. ... Read More
Using Digital Certificates for IoT Root of Trust
IoT implementations share common security requirements: a trusted device identity, data confidentiality, and integrity of data and firmware running on the device. These translate into authentication, encryption and code signing ... Read More
Top 10 Best Practices for Zero Trust IoT Manufacturing
Internet of things (IoT) and industrial control system (ICS) devices are especially vulnerable to cyber-attacks due to weak security controls and vulnerabilities in the manufacturing supply chain. For example, automotive electronic control units (ECUs), the devices that control in-vehicle safety, drive train, and infotainment systems, are often manufactured in a ... Read More
The Top IoT Vulnerabilities in Your Devices – Keyfactor
IoT devices make up 30% of all network-connected endpoints (not including mobile devices), making many companies the primary targets for cybercriminals ... Read More
The Top Internet of Things (IoT) Authentication Methods and Options
Gartner recently labeled Internet of Things Authentication as a high benefit in 2020 Gartner Hype Cycle for IAM Technologies. This blog covers your options for Internet of Things Authentication ... Read More
[Webinar Recap] Using Zero Trust Manufacturing for Supply Chains
With so many supply chain partners, the reality is that you cannot trust the manufacturing process’s security to ensure that the hardware, firmware, or credentials of the device were not altered ... Read More
The State of PKI & IoT Security | Keyfactor
The world of IoT has continued to rapidly expand, and as product innovators bring connected devices to market, the risk of device hacks and data theft continue to rise. Faster product development and feature delivery often take priority, leading to increased IoT security risks ... Read More
Top 5 Ways to Secure IoT Devices With PKI
There’s a lot of connected devices out there. That may seem like an obvious statement given that everyone seems to be walking around with a mobile phone, tablet, computer, and wireless headset. But what about all the devices that aren’t entertainment based? I’m thinking about all the connected vehicles, medical ... Read More