5 PKI Trends to Expect in the Next Year

Public Key Infrastructure (PKI) is the glue that holds the internet together. As the internet has developed into a multi-faceted ecosystem with every single ‘thing’ now considered an internet-connected endpoint, PKI has also had to develop … Continue reading 5 PKI Trends to Expect in the Next Year

IoT primes identity management for continued investment growth

IoT is slowly taking hold within enterprises and it’s often doing so as the foundation of Industry 4.0.  This is a trend that’s likely to accelerate as IoT not only transforms how consumers use and interact with the devices around them… Continue reading IoT primes identity management for continued investment growth

The Backend of Digital Signatures: How Do They Operate?

Digital signatures resemble electronic “fingerprints”. They consist of a mathematical process that’s applied to validate the authenticity and integrity of an online message. In the format of a ciphered message, the digital signature s… Continue reading The Backend of Digital Signatures: How Do They Operate?

Assessing Weaknesses in Public Key Infrastructure

Academic researchers size up weaknesses in the the code-signing Public Key Infrastructure and highlight three types of flaws. Continue reading Assessing Weaknesses in Public Key Infrastructure

Practical Public Key Cryptography

Encryption is one of the pillars of modern-day communications. You have devices that use encryption all the time, even if you are not aware of it. There are so many applications and systems using it that it’s hard to begin enumerating them. Ranging from satellite television to your mobile phone, from smart power meters to your car keys, from your wireless router to your browser, and from your Visa to your Bitcoins — the list is endless.

One of the great breakthroughs in the history of encryption was the invention of public key cryptography or asymmetrical cryptography in the 70’s. …read more

Continue reading Practical Public Key Cryptography

Everyone is working on their own ways to secure IoT

If there’s one thing that alarms even the hardened cybersecurity veterans at the Black Hat convention this year, it’s the huge attack surface represented by the burgeoning internet of things — and at least two researchers are presenting solutions designed to secure connected devices. Mikko Hypponen, chief research officer for F-Secure was touting his company’s solution for consumer devices; and Brian Knopf, Neustar’s senior security researcher gave a presentation about an alternative to Public Key Infrastructure encryption that enterprises can use to secure their IoT devices. “PKI is awful,” Knopf told CyberScoop, “It works OK for browsers … but it wasn’t designed for IoT devices … The problem is the scale.” PKI is a form of asymmetric encryption, in which users have a private key and a public key. Anyone with the public key can encrypt a message, which can then only be unscrambled with the private key. PKI is the basis for most internet […]

The post Everyone is working on their own ways to secure IoT appeared first on Cyberscoop.

Continue reading Everyone is working on their own ways to secure IoT

New report warns of connected-car security dangers

Securing the connected, smart and increasingly autonomous cars of tomorrow against hackers and criminals will only get harder as the computerized and constantly communicating ecosystem for connected vehicles expands to take in smart road infrastructure, smart homes and smart cities. That’s the warning in “Observations and Recommendations on Connected Vehicle Security,” a new paper from the Cloud Security Alliance, a tech-focused industry group that studies security issues and promulgates best practices. The authors were lead by Brian Russell, who is the chairman of CSA’s Internet of Things Working Group and the chief engineer for cybersecurity solutions at Leidos. They note that a connected vehicle’s attack surface only gets larger as automakers add more navigation, engine-control and entertainment systems inside the car, and society adds more smart devices and connected infrastructure outside of it. “Within a system-of-systems such as the CV ecosystem, there are many points of interconnectedness. A compromise of any one of these points potentially offers attackers the […]

The post New report warns of connected-car security dangers appeared first on Cyberscoop.

Continue reading New report warns of connected-car security dangers