
IoT
Are you authorized to read this post?
Building on our previous blog around authentication, we will now discuss the other side of the coin; and one that is often confused with authentication — authorization. Having proved that we are allowed to access the system, we now need…
Read blog
Latest Cybersecurity posts.
Recent posts
-
IoT
Authentication in Cybersecurity: Who do we think you are?
We said in our last blog that we would cover authentication and authorization in this follow up — however we quickly realized there is a lot to talk about on both topics, so we have split them. This post will… -
Integration & APIs
API Security: Preventing Vulnerabilities and Attacks
API Security is one of the top concerns for most organizations. The headlines are full of news of cybersecurity attacks and APIs are becoming a bigger target every day. Recently, I had the opportunity to join Keith Casey and Matthias… -
IoT
Building Defense in Depth
In the first blog of this series, we talked about the fact that a layered approach to security is required to minimize the attack vector. With all the different ways hackers can access sensitive systems, multiple types of solutions need… -
IoT
The future securely belongs to IoT
Many people would prefer not to talk about the topic of IoT security. Unfortunately, since attacks on IoT infrastructures are not uncommon, ignoring the subject would be a very bad idea. A variety of studies show that up to 70… -
IoT
IoT in Cybersecurity: Where is the silver bullet?
For everybody using Cloud-based services, security is a key concern. Each week we learn of another organization that has been successfully hacked, with sensitive corporate or personal data shared with malicious 3rd-parties or leaked to the Dark Web. According to…