-
Listen Now
EPISODE 116
Broadcast Date:
August 31, 202014 minutes
Podcast Aug 31, 2020Root Causes 116: Ripple20 Exposes TCP/IP Vulnerabilities for IoT
Ripple20 is a set of vulnerabilities in the early Treck TCP/IP stack, a popular IoT choice. Learn their significance and how we can avoid these problems.
-
Listen Now
EPISODE 107
Broadcast Date:
July 20, 202021 minutes
Podcast Jul 20, 2020Root Causes 107: IoT Security Baseline Requirements from ETSI
ETSI has published its new Baseline Requirements for consumer IoT device security.
-
Learn More
Sectigo Wins 2020 IoT Evolution Industrial IoT Product of the Year
A Press Release from Sectigo
Press Release Apr 30, 2020Sectigo has won a 2020 Industrial IoT Product of the Year Award from IoT Evolution World, the leading magazine and website covering IoT technologies. Sectigo’s industry-first end-to-end IoT Identity Platform provides a full spectrum of embedded device identity and integrity technologies, as well as purpose-built certificate issuance and management.
-
Learn More
How to Keep Cybercriminals from Attacking Via Our Car Key Fobs
A News Article from Sectigo
News Article Apr 18, 2020More and more cars are rolling off the lots using key fobs to handle a variety of operations, from simply unlocking the vehicle and remotely starting it to using a button push to have your smart vehicle automatically drive to where you are waiting. These car fobs can be wonderful, and very convenient—until it all goes bad.
-
Learn More
Sectigo Partners with Infineon to Protect IoT Devices
A News Article from Sectigo
News Article Apr 16, 2020Sectigo, a provider of automated digital identity management and web security solutions, announced a partnership with Infineon Technologies AG to provide automated certificate provisioning for Infineon’s OPTIGA Trusted Platform Module (TPM) 2.0 using Sectigo IoT Identity Manager.
-
Learn More
How to Keep Cyber-Criminals and Cyber-Terrorists from Attacking Via...
A News Article from Sectigo
News Article Apr 16, 2020An appropriate hardware solution is a first step toward building a secure authentication solution for automotive key fobs. This solution must be paired with an authentication solution that is not easily defeated. Use of asymmetric encryption with certificate-based authentication provides a strong defense against hacking. Certificate-based authentication requires a PKI solution to issue and manage certificates.
-
Learn More
Sectigo and Infineon Partner for Automated Factory Cert Provisioning
A Press Release from Sectigo
Press Release Apr 15, 2020The new Sectigo-Infineon integration provides manufacturers with a complete certificate management solution, including issuance and renewal, starting right on the factory floor, with secure certificate creation and insertion using the OPTIGA™ TPM for private key storage.
-
Listen Now
EPISODE 81
Broadcast Date:
April 6, 202015 minutes
Podcast Apr 06, 2020Root Causes 81: What Is Embedded Firewall?
In this episode our hosts explain what an embedded firewall is and how it aids security for connected devices.
-
Blog Post Apr 03, 2020
Sectigo IoT Identity Manager Short Listed for SC Awards
We are very happy to announce that Sectigo IoT Identity Manager has made the short list for SC Magazine’s SC Awards
-
Learn More
8 Immediate Steps to Take After Your Smarthome Is Hacked
A News Article from Sectigo
News Article Apr 03, 2020If you suspect your smarthome has been hacked, there are steps that you can take to stop the intruder.
-
Learn More
Why Car Key Fob Encryption Hacks Are Making Headlines
A Blog Post from Sectigo
Blog Post Mar 24, 2020Automotive key fobs are an attractive target for hackers. Sectigo explains why & how car key fob security can improve with the right encryption & software.
-
Learn More
Energy Firms Need to Get Savvy and ‘Paranoid’ About Grid Cybersecurity
A News Article from Sectigo
News Article Mar 23, 2020Digital security experts Tim Callan and Jason Soroko speak to NS Energy about the cyber threats posed to energy grids, and what the industry can do to address them.