Blog

IT security leaders write the Device Authority blog specifically for C-level executives in the IT community; highlighting the latest news, trends and topics in the industry. Join in the conversation and share your opinions and experiences.

“Doctor, Is my Treatment Secure?” – Ensuring Your Medical Devices Keep you Safe

"Doctor, Will I Need Surgery?” Ensuring Telemedicine is Delivered to You Safely and Securely

OWASP’s Top 10 IoT Vulnerabilities

Establishing Trust in the Digital World: Gartner Top 10 Strategic Technology Trends 2019

Another IoT botnet Torii exploits weak credentials – don’t let your organization be a victim

California Steps Up for IoT Device and Data Security

3 Things to Consider for IoT Platforms: IoT Security, Automation and Scale

Why choose Device Authority’s new IoT Security cloud service – aka KeyScaler as a Service (KSaaS)?

Tokenization for IoT Platforms, AEPs and Applications: A different approach for device authentication and authorization

3 weeks to go: Have you considered the impact of IoT on GDPR?

Is the #RSA security bubble bursting?

Secure by Design: Security Products vs Secure Products in IoT

Securing IoT Medical Devices – Benefits, Challenges, Requirements and Guidelines

Device Authority makes Blockchain IoT ready

Okiru puts Billions of IoT devices at risk – How to ensure IoT devices do not fall victim

CEO Corner: What will happen in 2018 for IoT?

Security Recommendations for IoT – Are you ready for 2018?

Satori IoT botnet with zero-day powers and over 280,000 bots in 12 hours. Protect your IoT devices NOW

Reaper IoT Botnet Leaves Millions of Devices Vulnerable to Hacking

Automated PKI is the foundation for IoT Security

First Mirai, now Persirai – how do you protect IoT devices from botnets?

Sky’s the limit with IoT security risk as Government called on to intervene

IoT security: a boardroom concern

How PKI has evolved to solve the IoT security issue

Top 4 takeaways from IoT World Conference

IoT Security is too critical to be an optional extra – Security by design, from the beginning

Device Identity and Integrity are the new perimeter for the IoT

IoT Security needs a customer-centric approach: 7 challenges and their solutions

IoT Security for Connected Surveillance Cameras

IT and OT in the Internet of Things

5 takeaways from #SmartSummitLondon

Counting Authenticated Devices

Intel Internet of Things Solutions Alliance

Healthcare IoT, Cloud and Security

Choosing an IoT security provider

What is a Smart City?

Over-The-Air Updates: Fixing software vulnerabilities is a vulnerability

Data Centric Security for IoT

The role of the channel in IoT Security

Cybercrime: reducing the risk

Security: What the fog?

Today’s corporate currency: digital trust

Solving the IoT data issue

Security: Everyone’s (not) doing it: what do teenagers have in common with data encryption?

Data Security & the Internet of Things - Square Peg, Round Hole?

Booms, not bubbles, economies and the IoT

Choosing the right encryption software

How the IoT is like an ATM

IoT security: getting it right first time

Subscribe to Email Updates