How to Identify IoT Pitfalls and Adopt Technology with Confidence

April 10, 2019 / by Chuck White

When looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.

Read more

Security and the Internet of Everything – Are We Ready?

December 28, 2018 / by Cathy Wolniewicz

The demand for connected devices is growing exponentially, but the technology to secure these devices is lagging creating cyber security vulnerabilities at a massive scale.

The Current State of Cyber Security

Every day we hear about breaches, hacks, and cyber-attacks affecting banks, hospitals, transportation, and even entire cities. In some instances, the impact can mean life or death. Our most trusted institutions – like the US election process – are not the pillars of security they once were. And yet the demand for “connected everything” continues to grow in all sectors and across the globe.

Read more

PODCAST: Chuck White Visits 'New Cyber Frontier' to Discuss Encryption and Cyber Defense

November 01, 2018 / by Fornetix

Our Chief Technology Officer at Fornetix, Chuck White, sat down with Professor Andre Hinton from the New Cyber Frontier podcast to explore the ways powerful encryption can solve the big problems of cybersecurity. Take a listen using the audio player below!

Read more

Key Orchestration: Identity, Credential, and Access Management (ICAM) for the IoT World

October 03, 2018 / by Chuck White

When looking at the problems we were trying to solve with Key Orchestration, IoT and IoE have always been part of the grand vision of Orchestration. As more and more systems break down the concept of perimeters or layers, there is a need to address the realities of these changes.

Read more

Guest Post: Why Cities Need to Get Serious About Cyber Defense

September 11, 2018 / by Maha Amircani

A special thank you to Maha Amircani for her guest post discussing the reality of cyber vulnerabilities faced by major cities. Maha is an attorney in Atlanta, Georgia and founder of Amircani Law. A Georgia native born to immigrant parents from Egypt, Maha represents clients in city, state and federal court litigation as well as administrative proceedings. Her practice specializes in the areas of personal injury, criminal defense, and real estate closings.


 

There has been a lot of interest in protecting businesses from the threat of ransomware. But, city governments are at real risk and the impact reverberates to people like me who interact with them daily. After the City of Atlanta ransomware attack in March 2018, this became crystal clear.

Read more
1
Page 1 of 1

Subscribe to Email Updates

Recent Posts