Remove Digital transformation Remove Firmware Remove IoT
article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. Related: IoT exposures explained I’ve conversed several times with Jeff Hudson about this. This is how cool new digital services are getting spun up at high velocity.

article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Today we’re in the throes of digital transformation. Consider that just five years ago, a large enterprise was typically responsible for managing tens of thousands of digital certificates. Today that number for many organizations is pushing a million or more digital certificates, as digital transformation accelerates.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

The following are six advantages of IoT in the manufacturing industry. Integrating IoTs into monitoring both equipment settings and the outcomes of each production step helps manufacturers detect quality problems at the source. . Transitioning to a smart factory requires paying close attention to industrial IoT security.

article thumbnail

For remote workforces, don’t overlook printer security

SC Magazine

Just like any other connected IoT device, hackers can compromise networked printers remotely. Manual configuration of devices can lead to problems with inconsistent settings and firmware levels. Automating security tasks releases IT admins from having to run firmware updates overnight to avoid interrupting business.

article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

In the digital transformation era, companies across all sectors are using next-generation technologies to streamline their operations, deliver value to customers, and gain a competitive edge. Invariably, Internet of Things (IoT) strategies form the backbone of those efforts.

article thumbnail

Where Exactly Are Code Signing Machine Identities Used?

Security Boulevard

This, along with the fact that most organizations now follow DevOps and digital transformation initiatives where business relies on more software, released faster than ever, makes most organizations vulnerable to these types of attacks. . Firmware and embedded software . IoT devices .

article thumbnail

Episode 147: Forty Year Old GPS Satellites offer a Warning about securing the Internet of Things

The Security Ledger

Joseph Menn of Reuters talks Beto and Cult of the Dead Cow Spotlight: CTIA’s IoT Cybersecurity Certification is a Big Deal. How Digital Transformation is forcing GRC to evolve. Spotlight Podcast: Managing the Digital Risk in your Digital Transformation. Here’s why. But don’t get too comfortable.