Blog

IT security leaders write the Device Authority blog specifically for C-level executives in the IT community; highlighting the latest news, trends and topics in the industry. Join in the conversation and share your opinions and experiences.

James Penney

Find me on:

Recent Posts

Security, encryption, IoT, authentication

Over-The-Air Updates: Fixing software vulnerabilities is a vulnerability

As the world welcomes the new wave of IoT devices in through our WIFI-connected front doors and into our everyday lives, more and more companies are releasing ‘smart’ internet-enabled versions of ...
Find Out More

IoT, fog computing

Security: What the fog?

Cloud computing, responsible for enabling a dramatic growth in internet-connected services over the last 15 years, is entering a new phase. ‘Fog computing’ – a vision first properly outlined by Cisco ...
Find Out More

Security

Data Security & the Internet of Things - Square Peg, Round Hole?

Existing Data Security solutions, specifically encryption services, have largely evolved to service the demand generated by secure human interaction with digital information. With this I mean the ...
Find Out More

Security

Choosing the right encryption software

Information and people are two of your business’s greatest assets. And they’re inextricably linked. People generate information and transmit it to each other. People, too, can unfortunately be one of ...
Find Out More

Data, IoT

IoT security: getting it right first time

Computer viruses and worms. It might not be one of the most well-known branches of history but it’s certainly a rich one. Consider the transition from John von Neumann’s article on the ‘Theory of ...
Find Out More

Subscribe to Email Updates