Amazing Fast Crypto for IoT — US NIST Fingers ASCON

Amazing Fast Crypto for IoT — US NIST Fingers ASCON

Implementing modern cryptography standards on tiny IoT devices is hard. They’re underpowered, need to sip battery charge and something like AES is often overkill ...
Security Boulevard
IoT Log4j Exchange ProxyLogon OT PKI IoT security

IoT Devices Risky Business for the Enterprise

As the number and diversity of IoT devices proliferates and diversifies, organizations find themselves under constant assault from threat actors who often turn to the same attack vectors time and again. Successfully ...
Security Boulevard
HPE edge IBM attack surface ukraine CISA Log4j CISA BlackBerry IoT connected device Bluetooth

Insider Threats and Security at the Edge

Edge computing is a vital component of digital transformation, allowing data to be analyzed and used in real-time closer to the point where it is created and consumed. Securing the edge requires ...
Security Boulevard
IoT Security

5 Top IoT Security Challenges and Solutions

The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, ...
Security Boulevard

Cloudy Crystal Gazing: Top 5 Cloud Security Predictions for 2022

We're joined by Dr. Michael J. Savoie to discuss the top 5 cloud security trends and predictions to watch in 2022.  The post Cloudy Crystal Gazing: Top 5 Cloud Security Predictions for ...
IoT Log4j Exchange ProxyLogon OT PKI IoT security

Rising Above Complexity to Secure IoT Devices

The internet of things (IoT) has truly come of age, and innovative new use cases are emerging all around us. Each day, we’re seeing the IoT in businesses and factories, cities, vehicles ...
Security Boulevard
Grammatech LCNC security Arctic Wolf Log4j BlastWave ransomware blast radius cyberattack

BlastWave Aims to Simplify Securing Edge Computing

BlastWave today launched a BlastShield offering that combines a software-defined perimeter (SDP) with microsegmentation and passwordless multifactor authentication (MFA) to make it easier to enforce identity-based zero-trust security policies on edge computing ...
Security Boulevard
edge remote work hybrid

Challenges Securing the Edge

Cybersecurity is all about protecting data, but it’s clear organizations need to make a greater effort to protect that data where it is, not where they’d like it to be or think ...
Security Boulevard
supply chain IoT edge trucking

Securing the Edge in the Supply Chain

The supply chain is something most people take for granted—until something goes wrong. The pandemic highlighted just how quickly business can grind to a halt if the supply chain is disrupted. Organizations ...
Security Boulevard
Palo Alto SASE 5G Health Care's Biggest Security Threat

Health Care Security Must Mature With 5G

It’s clear that 5G technology is rapidly coming of age, and is enjoying wide adoption across every industry. According to Gartner, the market for 5G infrastructure was predicted to hit $4.2 billion ...
Security Boulevard