Blog
Why we need to secure IoT connections sooner than later
March 30, 2020
0 Comment
By Mike Nelson
IoT products offer many conveniences but there are massive amounts of data being transferred to and from these services vulnerable to attack if left unsecured. In this podcast, Mike Nelson, Vice President of IoT Security at DigiCert, talks about the growing insecurity of IoT devices and what we should do
Should you hire a specialized cybersecurity recruiter?
March 30, 2020
0 Comment
By Zeljka Zorz
Finding skilled cybersecurity professionals to fill organizations’ increasing needs is becoming more difficult by the day due to the wide (and widening) cybersecurity workforce skills gap. So, how can organizations make the hiring process less painful and more fruitful? “Geographically there seem to be holes where no or little talent
Cybersecurity in the Time of COVID-19
March 30, 2020
0 Comment
By David P. Fidler
The COVID-19 pandemic overlaps the fields of public health and cybersecurity in ways never observed before, generating sobering reminders of underlying problems and unheeded warnings that have continued to characterize both fields in the United States for decades. A decade ago, Stuxnet pulled me into the accelerating, widening gyre of cybersecurity.
Securing IoT in a 5G World
March 27, 2020
0 Comment
By Joseph Cortese
Ask ten industry experts how 5G will impact their life and you’ll get ten different answers, as each of them are using the technology in different ways. For auto manufacturers, it’s all about connected vehicle technology. Telecommunication companies are preparing for the next generation of mobile devices, while the healthcare
Security Checklist for IoT Sensors
March 27, 2020
0 Comment
By Alan Grau
Developers building IoT sensor devices face a host of challenges and decisions. Which of the emerging IoT standards should they embrace? How can they distinguish their products in this competitive emerging field? How can they meet time-to-market challenges? Which IoT protocols should be utilized? With these challenges, security can become an