How to Identify IoT Pitfalls and Adopt Technology with Confidence

April 10, 2019 / by Chuck White

When looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.

Read more

Guest Post: Before You Dive Into IoT, Do These Three Things

April 10, 2019 / by Juan Asenjo

Olympic high diving requires concentration and self-control. Before divers jump off a 10-meter platform, they pause at the edge and concentrate on their goal: elegantly perform the acrobatic maneuver and gracefully pierce the water causing minimum surface disturbance. This same disciplined approach is required when adopting new and revolutionary technologies, such as those now available through the Internet of Things (IoT). Decision makers must assess the risks and benefits, consider potential difficulties, and then take the jump.

Read more

Top 4 Challenges When Managing Encryption

April 05, 2019 / by Ariel Mahlmann

Ariel Mahlmann is a sales and marketing intern with Fornetix. A recent University of Maryland graduate with a bachelor’s in economics, Ariel focuses on cyber security market research and social media marketing for Fornetix.

Implementing an encryption strategy comes with hefty baggage, but don't worry; we've got you covered. In this post, we'll cover the top four challenges of managing encryption and solutions to overcome them. 

Encryption key management is increasingly more important the more connected we become. With millions of devices and millions of users, there becomes an increasing need for effective cybersecurity tools that safeguard sensitive assets for individuals and organizations.

Read more

Fornetix Announces Bill Regan as New Senior Vice President of Finance

February 27, 2019 / by Fornetix

Frederick, MD, Feb. 2019 – Fornetix, an Orchestration Equity company and industry pioneer in enterprise key management technology, is excited to welcome Bill Regan as Senior Vice President of Finance. Regan brings to Fornetix 35 years of finance and accounting experience, including 25 years at public companies. He has extensive transactional experience including two IPOs and numerous acquisitions, divestitures, and financings. He comes to Fornetix from the specialty financing sector where he served as a corporate controller. Prior to that, he served as Vice President, Corporate Controller at Rentech. Regan holds a Bachelor of Science degree in Business Administration  Accounting from California State Polytechnic University, Pomona and is a Certified Public Accountant (inactive).

Read more

Network Runners and Fornetix Partner to Exhibit  Mission-Critical Technology at AFCEA WEST

February 06, 2019 / by Fornetix

Sterling, VA and Frederick, MD – February 5th, 2019 – Network Runners, Inc, a top technology consulting services company that supports the commercial and federal government market spaces, and Fornetix, a leading provider of encryption key management solutions for cyber security, announced they will partner and showcase cutting-edge defense systems at the AFCEA WEST Conference in San Diego, CA, on February. 12-15, 2019.

Read more

End-to-End Encryption Strategies Becoming the Norm for Social Media

January 24, 2019 / by Ariel Mahlmann

Ariel Mahlmann is a sales and marketing intern with Fornetix. A recent University of Maryland graduate with a bachelor’s in economics, Ariel focuses on cyber security market research and social media marketing for Fornetix.

Would you consider giving up personal data in exchange for a third-party app to show you what your ninety-year-old self will look like? The rise of social media brought lots of joy to consumers’ lives, allowing users to get glimpses of their future selves, to find out their horoscopes, and to communicate with others across the globe.

Read more

Security and the Internet of Everything – Are We Ready?

December 28, 2018 / by Cathy Wolniewicz

The demand for connected devices is growing exponentially, but the technology to secure these devices is lagging creating cyber security vulnerabilities at a massive scale.

The Current State of Cyber Security

Every day we hear about breaches, hacks, and cyber-attacks affecting banks, hospitals, transportation, and even entire cities. In some instances, the impact can mean life or death. Our most trusted institutions – like the US election process – are not the pillars of security they once were. And yet the demand for “connected everything” continues to grow in all sectors and across the globe.

Read more

Fornetix Announces Technology Partnership with Ruckus Networks

December 12, 2018 / by Fornetix

By Utilizing Fornetix Key Orchestration™, Ruckus Networks’ Customers Are Now Empowered to Maximize Security Controls Across All Ethernet-Based Networks

Read more

PODCAST: Chuck White Visits 'New Cyber Frontier' to Discuss Encryption and Cyber Defense

November 01, 2018 / by Fornetix

Our Chief Technology Officer at Fornetix, Chuck White, sat down with Professor Andre Hinton from the New Cyber Frontier podcast to explore the ways powerful encryption can solve the big problems of cybersecurity. Take a listen using the audio player below!

Read more

Key Orchestration: Identity, Credential, and Access Management (ICAM) for the IoT World

October 03, 2018 / by Chuck White

When looking at the problems we were trying to solve with Key Orchestration, IoT and IoE have always been part of the grand vision of Orchestration. As more and more systems break down the concept of perimeters or layers, there is a need to address the realities of these changes.

Read more
1 2 3 4 5
Page 1 of 5

Subscribe to Email Updates

Recent Posts