Ensuring a seamless integration of IoT with cybersecurity requires a strategic approach by technology leaders. Emphasizing secure bootstrapping, employing advanced, scalable onboarding standards such as FIDO onboarding device, and meticulously building a trusted supply chain are essential. Beyond these, it’s about creating a vigilant ecosystem where every component is not just included but examined for security integrity.


More

Cybersecurity Dive: Government investigation puts spotlight on password insecurity

When the U.S. Department of the Interior recently conducted an internal investigation into password security, the…

Read More →

Computerworld: Managed Apple IDs, iCloud, and the shadow IT connection

One new addition will be the ability to sync iCloud Keychain, Apple’s de facto password and…

Read More →

Infosecurity Magazine: Why it’s time to kick the password habit

Andrew Shikiar discusses why passwords are so hard to give up, and why they should…

Read More →