Remove Authentication Remove IoT Remove Manufacturing Remove Webinar
article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

This aptly describes the Internet of Things (IoT), where many small things are coming together to shape what we all hope will deliver a great leap in the way we live and do business. According to Maciej Kranz, Cisco VP for strategic innovation, writing for IoTechExpo.com , “[In 2018] IoT security will become the No.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. It’s also enabling manufacturers to respond faster to security vulnerabilities, market demand, and even natural disasters.

IoT 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

According to statistica the number of Internet of Things (IoT) devices connected will rise to 23 billion this year. From industrial machinery and intelligent transportation to health monitoring and emergency notification systems, a broad range of IoT devices are already being deployed by enterprises.

IoT 86
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is rapidly growing and expected to affect all industry verticals as well as our private lives. In this blog, we reached out to our technology partner Nexus to better understand the challenges that the industry faces to ensure safe deployment and management of IoT technologies. Weak authentication.

IoT 93
article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

However, in today’s IoT era, there are increasingly new ways people can break in to steal from us – by hacking into our Smart Devices. 1) Manufacturer Protocols “Matter” First, consumers should seek to purchase Smart Devices that are Matter certified. This article explains why these are vulnerable and 3 ways how we can protect them.

article thumbnail

Securing the Identities of Connected Cars

Thales Cloud Protection & Licensing

Manufacturing is one of the most attacked industries, facing a range of cybersecurity challenges. The proliferation of DevOps and distributed IoT devices, as well as the need to secure the digital identities of these applications and devices, calls for innovative approaches to PKI deployment. Use case: manufacturing enterprise.

article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Fraudulent Authentication These types of attacks are relevant to ‘long term identities’ where a private key (recovered from a public key) can be used to authenticate to a system for a variety of purposes that include: to create credentials that allow authentication into systems with the aim of causing damage or extracting information.

Risk 87