Ensuring a seamless integration of IoT with cybersecurity requires a strategic approach by technology leaders. Emphasizing secure bootstrapping, employing advanced, scalable onboarding standards such as FIDO onboarding device, and meticulously building a trusted supply chain are essential. Beyond these, it’s about creating a vigilant ecosystem where every component is not just included but examined for security integrity.


More

Information Management: Three steps toward stronger data protection

The FIDO Alliance has worked to create one of the strongest authentication protocols in the…

Read More →

CSO: 9 cyber security predictions for 2019

In this CSO article, the staff predicts that FIDO2 browser enhancements will help enable multifactor…

Read More →

The Verge: You can now sign into a Microsoft Account without a password using a security key

Microsoft is the first company to support passwordless authentication using FIDO2 WebAuthn and CTAP2 standards…

Read More →