This blog is co-written with Robert Masterson from Thales The shift toward cloud-native applications is changing the building blocks of IT. Development and maintenance of infrastructure and applications in-house just isn’t an opti [...]
In the IEEE conference publication, Factoring RSA Keys in the IoT Era, we showed that many of the IoT and network devices in use today are leveraging weak digital certificates that could expose them to attack.
Last October, the Food and Drug Administration (FDA) issued an update to Guidance on Content of Premarket Submission for Management of Cybersecurity in Medical Devices – initially drafted in 2014. The guidance applies to medical d [...]
Imagine a world with no access controls. A free for all resulting in chaos thanks to broken processes, zero audit trails, and no way to administer rights to the appropriate devices or people. Luckily, today’s IoT driven world is l [...]
A good API makes the difference between a software application and a software platform. Without an API, a software product is a special-purpose tool for a pre-defined set of specific operations. With a good API, though, it can bec [...]