IoT devices present danger before, during, and after deployment, and the proliferation of this technology is now a cause for concern from the cybersecurity point of view. Read what Executive Director Andrew Shikiar has to say on security challenges in this contributed piece in Cybersec Asia.


More

The Record: These major software firms took CISA’s secure-by-design pledge. Here’s how they’re implementing it

The Cybersecurity and Infrastructure Security Agency’s (CISA) secure-by-design pledge has hit its six-month mark, and…

Read More →

Security Boulevard: FIDO: Consumers are Adopting Passkeys for Authentication

There appears to be growing momentum behind the use of passkeys as an alternative identity…

Read More →

Retail TouchPoints: The Login Effect: The Role of Customer Authentication Psychology in Retail Success

Retail lags in authentication modernization, but not because providers aren’t interested in upgrading. It’s because…

Read More →