Internet of Things

UnifyID, the winner of a start-up competition at The RSA Conference, is offering a new type of "implicit" identity service.

Updated: RSA’s Hottest Startup Signals Online Identity Shakeup

In-brief: The RSA Conference’s most celebrated start-up, UnifyID, signals a fast-approaching revolution in how we do identity online.  (Updated with link to UnifyID interview video.  – PFR 2/20/2017)

Security Ledger Editor In Chief Paul Roberts speaks with Chenxi Wang of Twistlock at The RSA Conference. (Image courtesy of RSA Conference)

Interview: Chenxi Wang on Information Security’s Mr. Robot Problem and Enforcing IoT Standards

In-brief: In an interview with Security Ledger Editor in Chief Paul Roberts, Chenxi Wang of the firm Twist Lock talks about information security’s “Mr. Robot” problem and the need for standards for the Internet of Things. 

Webinar: Deconstructing the Top IoT Attacks of 2016

Webinar: Deconstructing the Top IoT Attacks of 2016

In-brief: a recording and slides from the Security Ledger and Bastille’s recent webinar “Deconstructing the Top IoT Hacks of 2016” are now available online. 

300 Billion Passwords? Internet of Things Growth poses Unprecedented Threat by 2020

300 Billion Passwords? Internet of Things Growth poses Unprecedented Threat by 2020

In-brief: Password management is already a big challenge for consumers and businesses. That problem is poised to get much (much) worse, as the population of The Internet of Things explodes, a new survey finds. 

Will hack for beer? Cisco's Talos security group rigged up a Kegerator with a WiFi hotspot and other controls, allowing an enterprising hacker who could break into the device to poor him or herself a beer. (Image courtesy of Marc Blackmer.)

At Industrial Control Security Con: Will hack IoT for Beer

In-brief: Cisco’s Marc Blackmer reports from the S4 Conference in Miami – one of the top gatherings of industrial control system security experts. Among the attractions this year: Justine Bone of the firm Medsec, the psychology of malicious insiders and a hackable “kegerator.”