Filter Blogs expand_more
Blog add
Authors add
Markets add
Solutions add
Products add
Product Categories add
14 Results for 'internet of things'
Blog

Internet of Things – Beware

By Bruce Morton
July 28, 2014
Entrust is now moving into the deployment of the Internet of Things (IoT) in an attempt to attach uniquely identifiable devices to the existing Internet infrastructure. The connected devices will allow you to receive better information, control items and, simply, just do fun stuff.
Blog

Securing the Internet of Things: Energy and Utilities

By Romona James
April 12, 2018
As new technologies and innovative solutions enter the picture, companies are working to modernize existing power infrastructures and deliver secure, reliable and affordable energy to end consumers. One significant driver in this transformation is the Internet of Things (IoT).
Blog

As Internet of Things Grows, Security Threats Put In the Spotlight

By Entrust Datacard
October 20, 2014
While there is no doubt the Internet of Things is growing and rapidly being adopted by a variety of industries, many security experts still worry about its lack of security precautions. As enterprises and consumers continue to realize the advantages of interconnected devices, the Internet of Things is rapidly growing. Companies that have implemented IoT devices are experiencing greater efficiency and lower costs, encouraging greater adoption of the technology.
Blog

Internet of Things Presents Security Issues for Enterprises

By Entrust Datacard
September 02, 2014
 The 2014 State of the Internet of Things, which surveyed more than 2,000 people in the U.S. about their use of connected devices, discovered 69 percent of consumers are planning to buy an IoT device for their home over the next five years. Connected devices like fitness bands, security systems and smart thermostats are expected to be the most popular devices with consumers in the coming years, according to the report.
Blog

INFOGRAPHIC: The Internet of Things Brings Benefits, Security Risks to Enterprises

By Entrust Datacard
September 17, 2014
The Internet of Things (IoT) promises to bring a variety of business benefits along with it, including increased efficiency across industries, cost savings in healthcare, safer infrastructure and more convenience in the home. Learn more about the promises and pitfalls of the IoT from Entrust Datacard. 
Blog

Internet of Things' Inherent Vulnerabilities Cause Trouble For Enterprises

By Entrust Datacard
September 05, 2014
With the ever-expanding Internet of Things (IOT), Wi-Fi connections can now be found on devices as varied as televisions, baby monitors and light bulbs. Unfortunately for consumers, the rapid growth of the IoT is being matched by an equally fast rise in security concerns. As the IoT continues to grow, businesses cannot ignore the technology, Entrust Datacard recommends steps to protect against the vulnerabilities inherent in it.
Blog

Ensuring a Trusted Internet of Things

By Jason Soroko
June 16, 2016
A secure ecosystem is possible when people, devices, and systems are able to trust each other and the concepts of identity play a foundational role in establishing this trust. From passwords, to certificates and analytics, there have been a number of techniques that have evolved over the years to establish and manage identity. 
Blog

Helping to Secure the Internet of Things

By Jason Soroko
October 07, 2016
Just as PKI is the underlying technology that secures the identities and transactions of today, it will help us to securely engage in a world where our lives will rarely leave some form of connected computing environment. Digital businesses will be more connected, more aware and more agile thanks to a secure IoT. 
Blog

Securing the Internet of Things: Connected Cars

By Ranjeet Khanna
October 18, 2017
If not properly secured, connected cars threaten to expose sensitive consumer information. With data being passed between so many different connected channels, it’s easier than ever for hackers to get their hands on personally identifiable information. It is very difficult to select a public key or a set of public keys that can be trusted for a long period of time. If the wrong public key is used, a website can be bricked until the server header expires. The wrong key could be provided accidentally or by an attacker. As in many cases, a site can be bricked where the administrator knows nothing about HPKP, or it’s been redirected by an attack.
Blog

Securing the Internet of Things: Devices & Networks

By Ranjeet Khanna
November 15, 2017
As the IoT assumes a bigger role across industries, security needs to take top priority. Here’s a look at four key challenges that must be taken care of before realizing the rewards of increased connectivity.  
Page 1 of 2