article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

As an increasing number of connected devices are deployed within IoT ecosystems, enterprises need to identify and authenticate them. Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Controlling Production Runs. This leads us to the second step.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

Instead, in today’s IoT landscape, we need additional authentication layers at the gadget level to ensure any connecting Smart Devices are trusted using certificates and keys – which are infinitely more difficult for a hacker to bypass or imitate – when attempting a break-in.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing the Identities of Connected Cars

Thales Cloud Protection & Licensing

Manufacturing is one of the most attacked industries, facing a range of cybersecurity challenges. To understand why we need this kind of hybrid approach, let us examine the use case of a manufacturing enterprise who put trust inthe added value of the joint Thales and PrimeKey solution. Use case: manufacturing enterprise.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Additionally, many auto manufacturers now have the ability to remotely update software to fix vulnerabilities or even upgrade functionality. Co-ordination is key.

IoT 77
article thumbnail

How Cyber Essentials can help secure your devices and software

IT Governance

Manufacturers often set the default configurations of new software and devices to be as open and multi-functional as possible. Improper authentication with external systems. Authenticate users before enabling Internet-based access to commercially or personally sensitive data, or data critical to the running of the organisation.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use. For more information on this topic, please visit Venafi.

IoT 85
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

Weak authentication. With IoT PKI, Secure IoT can be accomplished by enabling strong authentication and encryption of communication to ensure the integrity of transactions and data. When requesting the operator certificate from the operator’s CA, the device in the field can authenticate with the help of the factory certificate.

IoT 92