How to Identify IoT Pitfalls and Adopt Technology with Confidence

April 10, 2019 / by Chuck White

When looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.

Read more

PODCAST: Chuck White Visits 'New Cyber Frontier' to Discuss Encryption and Cyber Defense

November 01, 2018 / by Fornetix

Our Chief Technology Officer at Fornetix, Chuck White, sat down with Professor Andre Hinton from the New Cyber Frontier podcast to explore the ways powerful encryption can solve the big problems of cybersecurity. Take a listen using the audio player below!

Read more

Key Orchestration: Identity, Credential, and Access Management (ICAM) for the IoT World

October 03, 2018 / by Chuck White

When looking at the problems we were trying to solve with Key Orchestration, IoT and IoE have always been part of the grand vision of Orchestration. As more and more systems break down the concept of perimeters or layers, there is a need to address the realities of these changes.

Read more

Differentiating Key Managers & HSMs - Who Let the Keys Out?

May 15, 2018 / by Ken Czajkowski

Along with the rest of the industry, we recently attended the RSA Conference in San Francisco. While there, many conversations about Fornetix Key Orchestration (KO) started with “You’re an HSM?” or “I already have an HSM… why do I need a key manager?”  Key managers have very clear differences from Hardware Security Modules (HSMs.)  The main differences reside in how the encryption keys can be used by a Key Manager or HSM.  There are other more important differentiators, however, let’s start with how key managers leverage open standards, like the Key Management Interoperability Protocol (KMIP), and what exactly an HSM is.

Read more

Why Integrity Matters in Automotive Supply Chains (& What Cryptography Can Do About It)

January 27, 2018 / by Chuck White

When considering automotive IoT, it’s logical to focus on the supply chain that makes the car possible. In reviewing the application of key management to the automotive IoT landscape, it becomes apparent that the provenance of car components, from tires to telematics, is absolutely critical. Any poorly-built component can cause a systemic failure of the vehicle delivered to the consumer. When one typically thinks of applying encryption, it is focused on protecting the confidentiality of data at rest, in motion, or even while being processed. However, what about measuring whether the data should be trusted instead how whether it needs to be protected?

Read more

With Great Code Comes Great Vulnerability

December 21, 2017 / by Kevin Mooney

How Auto Makers Are Working to Secure Connected Cars

Last week, I attended the inaugural Auto-ISAC summit. "ISAC" stands for Information Sharing and Analysis Center. There are several long-standing ISACs for other industries including aviation, electricity, natural gas, and financial services. You can find the full list here if you are curious.

Read more
1
Page 1 of 1

Subscribe to Email Updates

Recent Posts