Remove Cloud Remove Computer and Electronics Remove IoT Remove Manufacturing
article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Use cases of secure IoT deployment. In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Tue, 06/01/2021 - 06:55. Use case 1: Fortune 500 Healthcare Company.

IoT 71
article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. Manufacturers will be required to adhere to the new cybersecurity safeguards when designing and producing these products. IoT market growth. IoT Security Neglected.

IoT 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. It’s also enabling manufacturers to respond faster to security vulnerabilities, market demand, and even natural disasters.

IoT 77
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is rapidly growing and expected to affect all industry verticals as well as our private lives. In this blog, we reached out to our technology partner Nexus to better understand the challenges that the industry faces to ensure safe deployment and management of IoT technologies. Weak authentication.

IoT 92
article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 - 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a burglar stealing valuables such as jewelry, cash, electronics, and equipment.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? Can you talk about how the big cloud providers could mitigate the threat of incorporating factory-compromised hardware into their operations? So how do you target that in a supply chain attack?

Security 209
article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. And sure, you are welcome.

MDM 49