Identifying and Authenticating Internet of Things (IoT) Objects

by Arthur Rowley

Explore what identifying and authenticating IoT (Internet of Things) is all about. This article discusses schemes available for IoT identification and authentication in depth. You will also get to know why it is essential to carry out both processes.

IoT refers to technology known as the Internet of Things. It is a transformative and beneficial ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Top 5 tips for using password managers

Password managers are a good way to keep your passwords unique, strong and safe. Tom Merritt gives us five tips on how to use them correctly


CISA and NSA Release Guidance on Selecting and Hardening VPNs

Original release date: September 28, 2021

The National Security Agency (NSA) and CISA ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


How safe is a quantum-safe virtual private network?

Verizon aims to find out by testing the technology, which is geared at enhancing encryption methods using session key exchange security mechanisms, the carrier said.


What’s going on with the ‘Great Resignation’?

By Steven J. Vaughan-NicholsComputerworld
You’d better work ...
Continue Reading →
0

Thanksgiving Turkey Award – Worst Passwords of 2020

If the Pandemic wasn’t enough to deal with, we still have to deal with people and their poor password choices.

Three passwords security controls that really make a difference.

  • Make your passwords longer than 12 characters
  • Use a password manager to create and remember long random passwords that are different for every location or resource.
  • Use two-factor authentication everywhere you can.

Have a Happy Thanksgiving – Be sure to watch the video below.

Top 200 Worst Passwords of 2021 from NordPass

Continue Reading →
2
Page 1 of 13 12345...»