What can the Equifax and other website breaches teach us about good se...
September 2017 by Jason Soroko
Why do some car drivers go for decades without an accident, and others seem to be involved in mishaps more…
Securing the Automotive IoT Ecosystem
March 2017 by Jason Soroko
Vehicles have had embedded computation and networking since the 1980s, but vehicles are now increasingly connected. This means OEMs are…
Telcom Industry and IoT: From ‘Can You Hear Me Now’ to Secure Serv...
February 2017 by Jason Soroko
Market Position Connectivity is a core capability of the Internet of Things (IoT). Massive mobile network operator (MNO) investment in…
Telcom Industry and IoT: From Can You Hear Me Now to Secure Service De...
February 2017 by Jason Soroko
Market Position Connectivity is a core capability of the Internet of Things (IoT). Massive mobile network operator (MNO) investment in…
Ensuring a Trusted Ecosystem in Automotive IoT, Part 2
November 2016 by Jason Soroko
Unlocking the Value of Connected Cars with Identity Connected Cars: Cost Savings and New Revenue Opportunities Automotive OEMs want their…
Ensuring a Trusted Ecosystem in Automotive IoT
November 2016 by Jason Soroko
Part 1: Identity as a Basis to Mitigate Risk Connected Cars: Trend Towards Innovation Cars are purchased to meet people’s…
Anticipating the Trend of IoT DDoS Botnets
November 2016 by Jason Soroko
There is Hope The term ‘Internet of Things’ (IoT) makes it easy to forget that we are talking about computing…
Helping to Secure the Internet of Things
October 2016 by Jason Soroko
The term IoT, or the Internet of Things, is usually presented with a set of superlatives about growth and opportunity….
Ensuring a Trusted Internet of Things
June 2016 by Jason Soroko
We are at the cusp of an era where our lives will rarely depart from a connected computing ecosystem of…
Desktop Security: The Need for Second-Factor Authentication
April 2014 by Jason Soroko
Many people have a great deal of faith in the security of their desktop computers and operating systems. But there…
Bypassing Fingerprint Biometrics Nothing New
October 2013 by Jason Soroko
So, Germany’s Chaos Computer Club — which weirdly sounds like an outcast AV group at someone’s high school — claims to have circumvented…
Not All Multifactor Authentication Techniques are Equal
September 2013 by Jason Soroko
The title of this post seems to be lost on some who are responsible for security architecture. One of my…