article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

Related: Leveraging PKI to advance electronic signatures. It used to be that trusting the connection between a workstation and a mainframe computer was the main concern. The security experts and thought leaders at DigiCert’s conference discussed the progress being made on a couple of other fronts: protocols and policies.

article thumbnail

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Grimm CEO Brain Demuth told me he hopes the work Grimm has commenced in Sparta will also contribute to generally elevating the security of all types of IoT systems. Get ready for smart ground transportation.

IoT 103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ignoring Internet of Things Devices Could Be IdIoTic: eDiscovery Trends

eDiscovery Daily

See what I did there? ; o ) While I’m speaking at the University of Florida E-Discovery Conference today, let’s take a look at a couple of articles related to Internet of Things (IoT) devices that you need to know from an eDiscovery standpoint. Dana Conneally, managing partner at QDiscovery and Evidox Corp., But, that’s not all!

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? National Security Agency. TS: Like a lot of things in security, the economics always win.

Security 201
article thumbnail

Highlights from DefCon 2018

Thales Cloud Protection & Licensing

We attended the show with our colleague Paul Cleary and sat in on many talks (and demos) ranging from attacking IoT devices over insecure Bluetooth connections, to exploiting publically available expired certificates. Are You a Good or Bad Hacker? The presenters collected over 300 million public keys from across the internet (X.509,

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

The first, IoT devices, have been much discussed but not yet been a major data factor. On board computer systems in automobiles, Exif data in digital photos, GPS coordinates in Google maps are all examples of this type of data which has been used as evidence for years. The first is forensic images of computers and cell phones.

article thumbnail

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

The 2018 Relativity Fest conference is here! If you’re in the Chicago area, you can still make it for nearly all of the conference or attend on a one-day pass. Also, I will be covering the show for eDiscovery Daily , and I’m delighted to say that I will also once again be speaking at a session at the conference tomorrow.