Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

This ain't' no Ordinary Product Release!

It’s breakthrough and game-changing for Biden’s SBOM and customers’ IoT Edge security and deployment challenges. This week the Device Authority team is proud to be releasing KeyScaler 7.0. This has been a seismic achievement, adding breakthrough features based on customer demand, as we advance our Product Led Growth Strategy to solve the Zero Trust for IoT security challenges. Device Authority’s breakthrough KeyScaler 7.0 release includes advanced Edge and SBOM capabilities.

What Is An IoT Device Security Platform? A Guide to What To Look For When Choosing An Enterprise Solution

As the number of IoT devices grows, predicted “to reach 27 billion or more by 2025 (IDC, IoT Analytics)”, so does the need for IoT device management companies and security solutions. While there are many benefits to the IoT, there are also security risks that come along with it. Gartner estimates that “75% of security failures will result from inadequate management of identities, access, and privileges” by 2023.

IoT Device Lifecycle Management: A Comprehensive Guide for IT Managers

IoT device lifecycle management is the process of managing the entire life cycle of an IoT device, from conception and design to manufacturing and distribution, to installation and eventual decommissioning. The goal of IoT device lifecycle management is to ensure that devices are properly managed throughout their lifespan to maximise their operational efficiency and longevity.

A Cautionary Tale of IoT Security

Imagine this… you walk into work; you are the supervisor of an automated automotive production line for one of the largest global car manufacturers. Everyone from the last shift is still there, they are not packing up to go home, in fact, they are panicking. The production line has shut down, nothing is working, and computer screens along the production line display a ransom demand.

Hey! Did you hear that (Insert: Your Company Name and Product) got hacked?

Have you noticed it’s never “Hey, someone got by a firewall” or “WOW, they bypassed the network security”? No. It’s always about the Device. It’s the same for hackers because everything else is just a means to an end, and that end is your Device! Imagine, late at night, driving around the Amusement Park security gate, then busting open the locked gated fence. These actions are necessary to get to the big score, the Rides! Yaaahoo!

Round up of the Singapore Digital Economy Agreement Mission 19th-22nd September 2022

From the 19th – 22nd September, Amit Rao, Vice President – Sales & Business Development Asia, was asked to be part of the UK’s DEA Mission delegation to Singapore, on behalf of Device Authority. The delegation comprised of high growth legal, cyber and safety tech companies.

Is the EU Cyber Resilience Act Really Possible Without Zero Trust Automation?

In May 2021 President Joe Biden issued out Executive Order 14028. The order focused on “Improving the Nation’s Cybersecurity” to support and protect the nation’s critical infrastructure and Federal Government networks. This directly relates to the trustworthiness and transparency in ALL digital infrastructure – IT, OT, IoT, IIoT.

Increasing Enterprise IoT Security with Identity and Access Management (IAM) Solutions

Internet of things (IoT) application and rollout has been rapid, disrupting and streamlining processes in a variety of industries, However, it has created a situation where “today’s IoT security is lightweight compared to enterprise application security” , creating a need for IoT security solutions than many of the insufficient and fragmented options.

Understanding IoT (Internet of Things) Security: Issues, Threats, and Defences

The Internet of Things (IoT) is increasingly becoming a part of our homes, businesses, and public services with a wide range of uses from ‘smart’ home appliances to complex industrial tools. With the increasing adoption and application of IoT devices, they have also become increasingly targeted by malicious actors looking to take advantage of opportunities to access them.