Why combining FIDO2 and PKI provides broader enterprise-wide security
FIDO2 authentication standards are great for streamlining the user experience, but CISOs still need PKI to manage machine identity and trusted interactions across the enterprise.
Everyone is working on their own ways to secure IoT
Companies are doing everything from building their own secure devices to creating new encryption protocols.
New report warns of connected-car security dangers
Securing the connected, smart and increasingly autonomous cars of tomorrow against hackers and online criminals will only get harder, warns the Cloud Security Alliance.
After study, Google gives keysticks two thumbs up
After a two-year study, Google is lauding the use of USB cryptographic keysticks as a way to authenticate identity online, preventing phishing and man-in-the-middle attacks and securing both individual accounts and the enterprise to which they belong.
Crypto is a mess inside enterprises
Public Key Infrastructure, the system used to create, manage and store the mathematical keys and digital certificates used for encryption, is under stress in many companies and agencies, according to a new Ponemon survey.