article thumbnail

BlueZone Web: Multi-factor authentication

Rocket Software

Millions of users around the globe—in verticals including finance, manufacturing and government—rely on Rocket to manage, access and modernize their mission-critical data on IBM Mainframe, IBM Power Systems and VT based systems. . The multi-factor authentication market is expected to reach 21 billion USD by 2025.

article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

In this blog, and in and accompanying interview with our colleague Daniel Hjort from Nexus Group, we discuss the challenges that industry faces to ensure safe deployment and management of IoT technologies. As an increasing number of connected devices are deployed within IoT ecosystems, enterprises need to identify and authenticate them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Guest Blog: TalkingTrust. There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality.

IoT 77
article thumbnail

3.5m IP cameras exposed, with US in the lead

Security Affairs

After looking at 28 of the most popular manufacturers, our research team found 3.5 While the default security settings have improved over the review period, some popular brands either offer default passwords or no authentication, meaning anyone can spy on the spies. Surge in internet-facing cameras. The reign of a Chinese brand.

Passwords 137
article thumbnail

Nexx bugs allow to open garage doors, and take control of alarms and plugs

Security Affairs

A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely open garage doors, and take control of alarms and plugs. Improper Authentication Validation CWE-287 ( CVE-2023–1752 , CVSS3.0: Authorization Bypass Through User-Controlled Key CWE-639 ( CVE-2023–1749 , CVSS3.0:

article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Volvo’s retailer exposed its database’s authentication information, including MySQL and Redis database hosts, open ports and credentials. The issue causing the leak has been fixed.

Retail 97
article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use.

IoT 85