Ensuring a seamless integration of IoT with cybersecurity requires a strategic approach by technology leaders. Emphasizing secure bootstrapping, employing advanced, scalable onboarding standards such as FIDO onboarding device, and meticulously building a trusted supply chain are essential. Beyond these, it’s about creating a vigilant ecosystem where every component is not just included but examined for security integrity.


More

The Wall Street Journal: Aetna Adds Behavior-Based Security to Customer Application

Insurance giant Aetna is rolling out a consumer mobile app that uses FIDO Authentication with…

Read More →

CSO: The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy…

Read More →

The Verge: Two-Factor Authentication is a Mess

While not all two-factor is created equal, The Verge reports that FIDO Authentication is the…

Read More →