Embracing DevSecOps with Automated Software Binary Security

Embracing DevSecOps with Automated Software Binary Security

DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but…

IoT Security: The Visibility of Assets in the Field

IoT Security: The Visibility of Assets in the Field

IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network…

Finding Security in an IIoT Driven World

Finding Security in an IIoT Driven World

It wasn’t that long ago that IIoT sounded out of reach. Who would have imagined we could control our home’s thermostat or turn on the sprinklers from anywhere in the world? The truth is, while it…

Cultivating Security in the Food Production Industry

Cultivating Security in the Food Production Industry

In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according…

A new partnership for ICS Cybersecurity and security of Smart Cities

A new partnership for ICS Cybersecurity and security of Smart Cities

The IoT Security Institute (IoTSI) announced this week that it has established a collaborative partnership with MEASC and Quill Security Technology. “This partnership acknowledges the increasing importance of a “time to act” approach to cybersecurity in smart cities and critical infrastructure…