Remove Encryption Remove Manufacturing Remove Security Remove Webinar
article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? The Urgency for Security in a Connected World. There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars. Device Security is Hard. Guest Blog: TalkingTrust. Thu, 03/11/2021 - 07:39.

IoT 78
article thumbnail

Securing the Identities of Connected Cars

Thales Cloud Protection & Licensing

Securing the Identities of Connected Cars. Manufacturing is one of the most attacked industries, facing a range of cybersecurity challenges. The proliferation of DevOps and distributed IoT devices, as well as the need to secure the digital identities of these applications and devices, calls for innovative approaches to PKI deployment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anatomy of a Quantum Attack

Thales Cloud Protection & Licensing

Each present a unique set of challenges and require equally powerful next-generation cyber security. A conventional computer would need 300 trillion years to break RSA encryption – considered the gold standard for Public Key Encryption (PKE). But another, far more damaging, attack vector is looming – quantum attack.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 - 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a burglar stealing valuables such as jewelry, cash, electronics, and equipment.

article thumbnail

How Cyber Essentials can help secure your devices and software

IT Governance

The Cyber Essentials scheme is a world-leading assurance mechanism for organisations of all sizes to help demonstrate that the most critical cyber security controls have been implemented. To highlight the importance and usefulness of the Cyber Essentials scheme, we are producing a series of blog posts each of its five security controls.

article thumbnail

2022 Cyber Security Review of the Year

IT Governance

Although there have still been a few surprises, with the death of Queen Elizabeth II and blazing heatwaves across the UK to name but two, it was a familiar year in the cyber security landscape. Google , Clearview AI , and Meta all receives hefty penalties in 2022, demonstrating the continued important of effective information security.

Security 132
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

It is no secret that security plays a very important part in the successful deployment and management of this technology, and its applications are set to transform the way we live and do business. What is the biggest security challenge facing the growing IoT? Solutions need to be secure but also a well-integrated part of an ecosystem.

IoT 93