Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

IoT

Device Authority and Entrust Demonstrate Their Partnership Potential to Provide Security to the Supply Chain

Identified as leaders in IoT (Internet of Things) Device Identity Lifecycle Management by ABI Research, and leaders in IoT IAM according to Quadrant, Device Authority and Entrust have worked together to integrate Device Authority’s KeyScaler® IoT IAM (Identity and Access Management) platform with PKI (Public Key Infrastructure) services from Entrust, extending the existing collaboration for Hardware Security Module (HSM) services, to provide device trust, data trust and automation at IoT sca

Does Your Organization Meet the 9 Core Capabilities Essential for Zero Trust in IoT?

Every one of your IoT devices has their own machine identity. But how are these identities the key to achieving Zero Trust IoT project? Today’s PKI (Public Key Infrastructure) vendors have specific solutions for managing non-human identities – machines – like servers, laptops, software applications, API’s and other assets found within a corporate network.

10 of the Most Common IoT Hacks and How to Defend Against Them

The Internet of Things (IoT) has revolutionised the way we live and work, connecting devices and systems to the internet and each other to create a more efficient and interconnected world. However, as with any new technology, the IoT comes with its own set of security risks and vulnerabilities. In this blog, we will look at the 10 most common IoT hacks and how to defend against them.

Netskope IoT Security

Netskope IoT Security uncovers managed and unmanaged connected devices on both the radio and network spectrum and generates deep device-level contextual intelligence for device classification, asset management, dynamic risk assessment, segmentation, and access control, mitigating IoT-related threats and addressing the hidden attack surface created by the connected devices.

The Future of IoT Security for Axeda Customers

Recently, Device Authority’s CTO James Penney recorded a podcast with Axeda Co-Founder and CTO Jim Hansen. Full disclosure: I was the first Salesperson hired by Axeda in 2001 and I can personally attest that at the time many companies thought we were out of our minds! In the early days, Axeda’s biggest challenge was getting machine makers to use this new thing called the Internet to remotely manage their high value assets in the field.

IoT/OT/ICS threats: Detecting vulnerable Boa web servers

On Nov. 22, 2022 Microsoft announced research findings about an ongoing supply chain attack against IoT devices running Boa web servers. The Boa web server, an open-source small-footprint web server suitable for embedded applications, was discontinued in 2005, but many software development kits still use this lightweight server on IoT hardware. Since being discontinued, vulnerabilities were discovered in Boa that make every version out there exploitable.

This ain't' no Ordinary Product Release!

It’s breakthrough and game-changing for Biden’s SBOM and customers’ IoT Edge security and deployment challenges. This week the Device Authority team is proud to be releasing KeyScaler 7.0. This has been a seismic achievement, adding breakthrough features based on customer demand, as we advance our Product Led Growth Strategy to solve the Zero Trust for IoT security challenges. Device Authority’s breakthrough KeyScaler 7.0 release includes advanced Edge and SBOM capabilities.

What Is An IoT Device Security Platform? A Guide to What To Look For When Choosing An Enterprise Solution

As the number of IoT devices grows, predicted “to reach 27 billion or more by 2025 (IDC, IoT Analytics)”, so does the need for IoT device management companies and security solutions. While there are many benefits to the IoT, there are also security risks that come along with it. Gartner estimates that “75% of security failures will result from inadequate management of identities, access, and privileges” by 2023.