
IoT
Three Key IoT Cybersecurity Insights
Co-authored by saran govindarajan The era of Smart Connect Products is turning every company into a software company. The ability to connect, manage, and monitor assets across the globe comes with the responsibility to collect and store data securely and…
Read blog
Latest Cybersecurity posts.
Recent posts
-
IoT
Six Cybersecurity Questions to Ask Your IoT Partners
CO-AUTHORED BY SARAN GOVINDARAJAN Many of the topics we have addressed in our cybersecurity posts apply to a wide range of IT deployments. There are two main considerations that apply especially for Industrial IoT applications, from Smart Connected Products to… -
IoT
Don’t Wait Until It’s Too Late: How to Build Security into IoT Apps from the Beginning
Co-authored by saran govindarajan As we continue building cybersecurity into IoT deployments, the next area we want to consider are the challenges of creating your own applications. Let’s consider the approach most of us take when creating an application. The excitement… -
IoT
Are you authorized to read this post?
Building on our previous blog around authentication, we will now discuss the other side of the coin; and one that is often confused with authentication — authorization. Having proved that we are allowed to access the system, we now need… -
IoT
Authentication in Cybersecurity: Who do we think you are?
We said in our last blog that we would cover authentication and authorization in this follow up — however we quickly realized there is a lot to talk about on both topics, so we have split them. This post will… -
Integration & APIs
API Security: Preventing Vulnerabilities and Attacks
API Security is one of the top concerns for most organizations. The headlines are full of news of cybersecurity attacks and APIs are becoming a bigger target every day. Recently, I had the opportunity to join Keith Casey and Matthias… -
IoT
Building Defense in Depth
In the first blog of this series, we talked about the fact that a layered approach to security is required to minimize the attack vector. With all the different ways hackers can access sensitive systems, multiple types of solutions need… -
IoT
The future securely belongs to IoT
Many people would prefer not to talk about the topic of IoT security. Unfortunately, since attacks on IoT infrastructures are not uncommon, ignoring the subject would be a very bad idea. A variety of studies show that up to 70… -
IoT
IoT in Cybersecurity: Where is the silver bullet?
For everybody using Cloud-based services, security is a key concern. Each week we learn of another organization that has been successfully hacked, with sensitive corporate or personal data shared with malicious 3rd-parties or leaked to the Dark Web. According to…