Four key tenets of zero trust security

As cybercrime threatens businesses of all sizes, industries and locations, organizations have realized that the status quo is no longer tenable and that implementing zero trust is necessary. Zero trust is a security model that can be summed up as “Neve… Continue reading Four key tenets of zero trust security

Digital key builds on past practices to create a more secure future

Too often, we assume that new technology replaces the old, but technology often builds off past generations, ideas, and success, rather than abandoning it altogether. Some people may not realize that past technologies are foundational to new technology… Continue reading Digital key builds on past practices to create a more secure future

The evolution of identity-first security

Earlier this year, Gartner named identity-first security as one of the top security and risk management trends for 2021. Companies have been moving away from traditional LAN edge approaches, and now identity lies at the center of security strategies. M… Continue reading The evolution of identity-first security

Creating a unique password for each device/unit of the same product

We are currently working on an IoT product & having a hard time coming up with a strategy to create a unique password for each device/unit.
I do understand that password based on a function of { serial number, CPU id, MAC address or ti… Continue reading Creating a unique password for each device/unit of the same product