Ensuring a seamless integration of IoT with cybersecurity requires a strategic approach by technology leaders. Emphasizing secure bootstrapping, employing advanced, scalable onboarding standards such as FIDO onboarding device, and meticulously building a trusted supply chain are essential. Beyond these, it’s about creating a vigilant ecosystem where every component is not just included but examined for security integrity.


More

Dark Reading: Passwords Use Alone Still Trumps Multi-Factor Authentication

Dark Reading reports on theJavelin Strategy & Research’s 2017 State of Authentication Report, commissioned by…

Read More →

New York Times: Google’s Key to Strong Password Protection Runs Into Limits

John Sabin, a former hacker for the National Security Agency, says Google’s Advanced Protection Program…

Read More →

Infosecurity: Strong Authentication Still Elusive for Businesses

According to a new Javelin Strategy & Research “2017 State of Authentication Report,” sponsored by…

Read More →