Mitigating DDoS Attacks With Secure IoT Endpoints


IoT life-cycle management should be implemented via a hardware root-of-trust to ensure secure updates of firmware and cryptographic keys. A hardware root-of-trust with a cryptographic identifier also allows each IoT device to be uniquely and cryptographically verified to determine if it is authorized to connect to a specific cloud service. Spoofed or unauthorized devices are easily identified b... » read more

Miles Wide And High Security


Talk about security in autonomous vehicles seems to have subsided. It shouldn't, because the problem is far from solved. In fact, it's not just one problem. It's layers upon layers of problems spread out across all roadways, technology design houses, IP developers, network infrastructure, and the entire supply chain. And even though one vehicle's security may be bulletproof, it may be no... » read more