Internet of Things

Internet of Things Concept - Tree

PKI Points the Way for Identity and Authentication in IoT

Modern enterprise networks are populated by both people and, increasingly, “things.” But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at DigiCert discusses what is needed for effective IoT security.

Flock Safety Sign

Episode 188: Flock Safety Flies in Surveillance Technology’s Gray Zone

In this episode of the Security Ledger Podcast (#188), sponsored* by LastPass, we take a look at the fast-expanding world of crowdsourced surveillance by doing a deep dive on Flock Safety, a start up that sells inexpensive license plate scanners to homeowners and police departments. Also: users know that password security is important…but they can’t seem to change their insecure behavior. In our second segment, We talk about why with Katie Petrillo of LogMeIn and LastPass.

adobe cybersecurity concept

“Boothole” Bootloader Flaw Breaks Security on Most Linux, Windows Devices

A newly discovered vulnerability dubbed ‘Boothole’ compromises the foundation of device security for “virtually all Linux distributions” and some Microsoft’s Windows devices that employ “Secure Boot” feature, according to a new report.

Internet of Things Concept Image

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

In this Spotlight Podcast Intel Fellow Claire Vishik joins us to talk about the evolving concept of online “trust.” Vishik is a TCG Director and spent 14 years as the Director of Trusted Technologies at Intel.

IoT Security Image

Episode 186: Certifying Your Smart Home Security with GE Appliances and UL

In this episode of the podcast (#186) we do a deep dive on the new IoT cyber security rating system from Underwriters’ Lab. We talk with experts from GE about the process they used to obtain UL certification for a range of smart home appliances, managing device security over the decades and how a cyber security rating system may influence consumers’ behavior.